SlideShare uma empresa Scribd logo
1 de 66
Baixar para ler offline
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 1 of 66
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
AC-1 Access Control Policy and
Procedures
X X AC-1.b.1 [at least every 3 years]
AC-1.b.2 [at least annually]
AC-2 Account Management X X AC-2j [at least annually]
AC-2 (1) Account Management |
Automated System Account
Management
X
AC-2 (2) Account Management |
Removal of Temporary /
Emergency Accounts
X [No more than 30 days for temporary and
emergency account types]
AC-2 (3) Account Management | Disable
Inactive Accounts
X [90 days for user accounts] Requirement: The service provider defines the
time period for non-user accounts (e.g.,
accounts associated with devices). The time
periods are approved and accepted by the
Authorizing Official.
AC-2 (4) Account Management |
Automated Audit Actions
X
AC-2 (5) Account Management |
Inactivity Logout
X
AC-2 (7) Account Management | Role-
Based Schemes
X
AC-2 (9) Account Management |
Restrictions on Use of Shared
Groups / Accounts
X Required if shared/group accounts are
deployed
AC-2 (10) Account Management | Shared
/ Group Account Credential
Termination
X Required if shared/group accounts are
deployed
AC-2 (12) Account Management | Account
Monitoring / Atypical Usage
X AC-2 (12)(a) and AC-2 (12)(b) Additional
FedRAMP Requirements and Guidance:
Required for privileged accounts.
AC-3 Access Enforcement X X
AC-4 Information Flow Enforcement X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 2 of 66
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
A B C D
Base
Control
ID
Control Title Low Mod
AC-1 Access Control Policy and
Procedures
X X
AC-2 Account Management X X
AC-2 (1) Account Management |
Automated System Account
Management
X
AC-2 (2) Account Management |
Removal of Temporary /
Emergency Accounts
X
AC-2 (3) Account Management | Disable
Inactive Accounts
X
AC-2 (4) Account Management |
Automated Audit Actions
X
AC-2 (5) Account Management |
Inactivity Logout
X
AC-2 (7) Account Management | Role-
Based Schemes
X
AC-2 (9) Account Management |
Restrictions on Use of Shared
Groups / Accounts
X
AC-2 (10) Account Management | Shared
/ Group Account Credential
Termination
X
AC-2 (12) Account Management | Account
Monitoring / Atypical Usage
X
AC-3 Access Enforcement X X
AC-4 Information Flow Enforcement X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 3 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
17
18
19
20
21
22
23
24
25
AC-4 (21) Information Flow Enforcement |
Physical / Logical Separation of
Information Flows
X
AC-5 Separation of Duties X
AC-6 Least Privilege X
AC-6 (1) Least Privilege | Authorize
Access to Security Functions
X
AC-6 (2) Least Privilege | Non-Privileged
Access For No security
Functions
X [all security functions] AC-6 (2). Guidance: Examples of security
functions include but are not limited to:
establishing system accounts, configuring
access authorizations (i.e., permissions,
privileges), setting events to be audited, and
setting intrusion detection parameters, system
programming, system and security
administration, other privileged functions.
AC-6 (5) Least Privilege | Privileged
Accounts
X
AC-6 (9) Least Privilege | Auditing Use of
Privileged Functions
X
AC-6 (10) Least Privilege | Prohibit Non-
privileged Users from Executing
Privileged Functions
X
AC-7 Unsuccessful Logon Attempts X X AC-7a [not more than three]
[fifteen minutes]
AC-7b [locks the account/node for thirty
minutes]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 4 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
17
18
19
20
21
22
23
24
25
AC-4 (21) Information Flow Enforcement |
Physical / Logical Separation of
Information Flows
X
AC-5 Separation of Duties X
AC-6 Least Privilege X
AC-6 (1) Least Privilege | Authorize
Access to Security Functions
X
AC-6 (2) Least Privilege | Non-Privileged
Access For No security
Functions
X
AC-6 (5) Least Privilege | Privileged
Accounts
X
AC-6 (9) Least Privilege | Auditing Use of
Privileged Functions
X
AC-6 (10) Least Privilege | Prohibit Non-
privileged Users from Executing
Privileged Functions
X
AC-7 Unsuccessful Logon Attempts X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 5 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
26
27
28
29
30
31
AC-8 System Use Notification X X Parameter: See Additional Requirements and
Guidance.
Requirement: The service provider shall
determine elements of the cloud environment
that require the System Use Notification control.
The elements of the cloud environment that
require System Use Notification are approved
and accepted by the Authorizing Official (AO).
Requirement: The service provider shall
determine how System Use Notification is going
to be verified and provide appropriate
periodicity of the check. The System Use
Notification verification and periodicity are
approved and accepted by the AO.
Guidance: If performed as part of a
Configuration Baseline check, then the % of
items requiring setting that are checked and
that pass (or fail) check can be provided.
Requirement: If not performed as part of a
Configuration Baseline check, then there must
be documented agreement on how to provide
results of verification and the necessary
periodicity of the verification by the service
provider. The documented agreement on how
to provide verification of the results are
approved and accepted by the AO.
AC-10 Concurrent Session Control X [three (3) sessions for privileged access and
two (2) sessions for non-privileged access]
AC-11 Session Lock X AC-11a. [fifteen minutes]
AC-11 (1) Session Lock | Pattern-Hiding
Displays
X
AC-12 Session Termination X
AC-14 Permitted Actions Without
Identification or Authentication
X X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 6 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
26
27
28
29
30
31
AC-8 System Use Notification X X
AC-10 Concurrent Session Control X
AC-11 Session Lock X
AC-11 (1) Session Lock | Pattern-Hiding
Displays
X
AC-12 Session Termination X
AC-14 Permitted Actions Without
Identification or Authentication
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 7 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
AC-17 Remote Access X X
AC-17 (1) Remote Access | Automated
Monitoring / Control
X
AC-17 (2) Remote Access | Protection of
Confidentiality / Integrity Using
Encryption
X
AC-17 (3) Remote Access | Managed
Access Control Points
X
AC-17 (4) Remote Access | Privileged
Commands / Access
X
AC-17 (9) Remote Access | Disconnect /
Disable Access
X [no greater than 15 minutes]
AC-18 Wireless Access X X
AC-18 (1) Wireless Access |
Authentication and Encryption
X
AC-19 Access Control For Mobile
Devices
X X
AC-19 (5) Access Control For Mobile
Devices | Full Device /
Container-Based Encryption
X
AC-20 Use of External Information
Systems
X X
AC-20 (1) Use of External Information
Systems | Limits on Authorized
Use
X
AC-20 (2) Use of External Information
Systems | Portable Storage
Devices
X
AC-21 Information Sharing X
AC-22 Publicly Accessible Content X X AC-22d. [at least quarterly]
AT-1 Security Awareness and
Training Policy and Procedures
X X AT-1.b.1 [at least every 3 years]
AT-1.b.2 [at least annually]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 8 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
AC-17 Remote Access X X
AC-17 (1) Remote Access | Automated
Monitoring / Control
X
AC-17 (2) Remote Access | Protection of
Confidentiality / Integrity Using
Encryption
X
AC-17 (3) Remote Access | Managed
Access Control Points
X
AC-17 (4) Remote Access | Privileged
Commands / Access
X
AC-17 (9) Remote Access | Disconnect /
Disable Access
X
AC-18 Wireless Access X X
AC-18 (1) Wireless Access |
Authentication and Encryption
X
AC-19 Access Control For Mobile
Devices
X X
AC-19 (5) Access Control For Mobile
Devices | Full Device /
Container-Based Encryption
X
AC-20 Use of External Information
Systems
X X
AC-20 (1) Use of External Information
Systems | Limits on Authorized
Use
X
AC-20 (2) Use of External Information
Systems | Portable Storage
Devices
X
AC-21 Information Sharing X
AC-22 Publicly Accessible Content X X
AT-1 Security Awareness and
Training Policy and Procedures
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 9 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
48
49
50
51
52
53
54
55
AT-2 Security Awareness Training X X AT-2. [Assignment: organization-defined
frequency]
Parameter: [at least annually]
AT-2 (2) Security Awareness | Insider
Threat
X
AT-3 Role-Based Security Training X X AT-3c. [Assignment: organization-defined
frequency]
Parameter: [at least annually]
AT-4 Security Training Records X X AT-4b. [Assignment: organization-defined
frequency]
Parameter: [At least one years]
AU-1 Audit and Accountability Policy
and Procedures
X X AU-1.b.1 [at least every 3 years]
AU-1.b.2 [at least annually]
AU-2 Audit Events X X AU-2a. [Successful and unsuccessful account
logon events, account management events,
object access, policy change, privilege
functions, process tracking, and system events.
For Web applications: all administrator activity,
authentication checks, authorization checks,
data deletions, data access, data changes, and
permission changes];
AU-2d. [organization-defined subset of the
auditable events defined in AU-2 a. to be
audited continually for each identified event].
AU-2 (3) Audit Events | Reviews and
Updates
X AU-2 (3). [Assignment: organization-defined
frequency]
Parameter: [annually or whenever there is a
change in the threat environment]
Guidance: Annually or whenever changes in
the threat environment are communicated to
the service provider by the Authorizing Official.
AU-3 Content of Audit Records X X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 10 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
48
49
50
51
52
53
54
55
AT-2 Security Awareness Training X X
AT-2 (2) Security Awareness | Insider
Threat
X
AT-3 Role-Based Security Training X X
AT-4 Security Training Records X X
AU-1 Audit and Accountability Policy
and Procedures
X X
AU-2 Audit Events X X
AU-2 (3) Audit Events | Reviews and
Updates
X
AU-3 Content of Audit Records X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 11 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
56
57
58
59
60
61
62
63
64
AU-3 (1) Content of Audit Records |
Additional Audit Information
X AU-3 (1). [Assignment: organization-defined
additional, more detailed information]
Parameter: [session, connection, transaction, or
activity duration; for client-server transactions,
the number of bytes received and bytes sent;
additional informational messages to diagnose
or identify the event; characteristics that
describe or identify the object or resource being
acted upon]
AU-3 (1). Requirement: The service provider
defines audit record types. The audit record
types are approved and accepted by the
Authorizing Official.
Guidance: For client-server transactions, the
number of bytes sent and received gives
bidirectional transfer information that can be
helpful during an investigation or inquiry.
AU-4 Audit Storage Capacity X X
AU-5 Response to Audit Processing
Failures
X X AU-5b. [Assignment: Organization-defined
actions to be taken]
Parameter: [low-impact: overwrite oldest audit
records; moderate-impact: shut down]
AU-6 Audit Review, Analysis, and
Reporting
X X AU-6a. [Assignment: organization-defined
frequency]
Parameter: [at least weekly]
AU-6 (1) Audit Review, Analysis, and
Reporting | Process Integration
X
AU-6 (3) Audit Review, Analysis, and
Reporting | Correlate Audit
Repositories
X
AU-7 Audit Reduction and Report
Generation
X
AU-7 (1) Audit Reduction and Report
Generation | Automatic
Processing
X
AU-8 Time Stamps X X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 12 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
56
57
58
59
60
61
62
63
64
AU-3 (1) Content of Audit Records |
Additional Audit Information
X
AU-4 Audit Storage Capacity X X
AU-5 Response to Audit Processing
Failures
X X
AU-6 Audit Review, Analysis, and
Reporting
X X
AU-6 (1) Audit Review, Analysis, and
Reporting | Process Integration
X
AU-6 (3) Audit Review, Analysis, and
Reporting | Correlate Audit
Repositories
X
AU-7 Audit Reduction and Report
Generation
X
AU-7 (1) Audit Reduction and Report
Generation | Automatic
Processing
X
AU-8 Time Stamps X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 13 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
65
66
67
68
69
70
71
AU-8 (1) Time Stamps | Synchronization
With Authoritative Time Source
X AU-8 (1). [http://tf.nist.gov/tf-cgi/servers.cgi] <At
least hourly>
AU-8 (1). Requirement: The service provider
selects primary and secondary time servers
used by the NIST Internet time service. The
secondary server is selected from a different
geographic region than the primary server.
Requirement: The service provider
synchronizes the system clocks of network
computers that run operating systems other
than Windows to the Windows Server Domain
Controller emulator or to the same time source
for that server.
Guidance: Synchronization of system clocks
improves the accuracy of log analysis.
AU-9 Protection of Audit Information X X
AU-9 (2) Protection of Audit Information |
Audit Backup on Separate
Physical Systems /
Components
X AU-9 (2). [at least weekly]
AU-9 (4) Protection of Audit Information |
Access by Subset of Privileged
Users
X
AU-11 Audit Record Retention X X AU-11. [at least ninety days] AU-11. Requirement: The service provider
retains audit records on-line for at least ninety
days and further preserves audit records off-line
for a period that is in accordance with NARA
requirements.
AU-12 Audit Generation X X AU-12a. [all information system and network
components where audit capability is
deployed/available]
CA-1 Security Assessment and
Authorization Policies and
Procedures
X X CA-1.b.1 [at least every 3 years]
CA-1.b.2 [at least annually]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 14 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
65
66
67
68
69
70
71
AU-8 (1) Time Stamps | Synchronization
With Authoritative Time Source
X
AU-9 Protection of Audit Information X X
AU-9 (2) Protection of Audit Information |
Audit Backup on Separate
Physical Systems /
Components
X
AU-9 (4) Protection of Audit Information |
Access by Subset of Privileged
Users
X
AU-11 Audit Record Retention X X
AU-12 Audit Generation X X
CA-1 Security Assessment and
Authorization Policies and
Procedures
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 15 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
72
73
74
75
76
77
78
79
80
CA-2 Security Assessments X X CA-2b. [at least annually]
CA-2d[individuals or roles to include FedRAMP
PMO]
CA-2 (1) Security Assessments |
Independent Assessors
X X Added to NIST Baseline for "Low" FedRAMP
baseline.
For JAB Authorization, must be an accredited
3PAO
CA-2 (2) Security Assessments |
Specialized Assessments
X [at least annually] Requirement: To include 'announced',
'vulnerability scanning'
CA-2 (3) Security Assessments |
External Organizations
X [Any FedRAMP Accredited 3PAO] [the
conditions of a P-ATO in the FedRAMP
Repository]
CA-3 System Interconnections X X CA-3c. 3 Years / Annually and on input from
FedRAMP
CA-3 (3) System Interconnections |
Unclassified Non-National
Security System Connections
X Boundary Protections which meet the Trusted
Internet Connection (TIC) requirements
CA-3(3) Guidance: Refer to Appendix H –
Cloud Considerations of the TIC 2.0 Reference
Architecture document.
CA-3 (5) System Interconnections |
Restrictions on External
Network Connections
X For JAB Authorization, CSPs shall include
details of this control in their Architecture
Briefing
CA-5 Plan of Action and Milestones X X CA-5b. [at least monthly] CA-5 Guidance: Requirement: POA&Ms must
be provided at least monthly.
CA-6 Security Authorization X X CA-6c. [at least every three years or when a
significant change occurs]
CA-6c. Guidance: Significant change is defined
in NIST Special Publication 800-37 Revision 1,
Appendix F. The service provider describes the
types of changes to the information system or
the environment of operations that would
impact the risk posture. The types of changes
are approved and accepted by the Authorizing
Official.
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 16 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
72
73
74
75
76
77
78
79
80
CA-2 Security Assessments X X
CA-2 (1) Security Assessments |
Independent Assessors
X X
CA-2 (2) Security Assessments |
Specialized Assessments
X
CA-2 (3) Security Assessments |
External Organizations
X
CA-3 System Interconnections X X
CA-3 (3) System Interconnections |
Unclassified Non-National
Security System Connections
X
CA-3 (5) System Interconnections |
Restrictions on External
Network Connections
X
CA-5 Plan of Action and Milestones X X
CA-6 Security Authorization X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 17 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
81
82
83
84
85
86
87
88
89
90
91
CA-7 Continuous Monitoring X X CA-7d. [To meet Federal and FedRAMP
requirements]
Operating System Scans: at least monthly
Database and Web Application Scans: at least
monthly
All scans performed by Independent Assessor:
at least annually
CA-7 Guidance: CSPs must provide evidence
of closure and remediation of high
vulnerabilities within the timeframe for standard
POA&M updates.
CA-7 (1) Continuous Monitoring |
Independent Assessment
X
CA-8 Penetration Testing X [at least annually]
CA-8 (1) Penetration Testing |
Independent Penetration Agent
or Team
X
CA-9 Internal System Connections X X
CM-1 Configuration Management
Policy and Procedures
X X CM-1.b.1 [at least every 3 years]
CM-1.b.2 [at least annually]
CM-2 Baseline Configuration X X
CM-2 (1) Baseline Configuration |
Reviews and Updates
X CM-2 (1) (a). [at least annually]
CM-2 (1) (b). [to include when directed by
Authorizing Official]
CM-2 (2) Baseline Configuration |
Automation Support For
Accuracy / Currency
X
CM-2 (3) Baseline Configuration |
Retention of Previous
Configurations
X
CM-2 (7) Baseline Configuration |
Configure Systems,
Components, or Devices for
High-Risk Areas
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 18 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
81
82
83
84
85
86
87
88
89
90
91
CA-7 Continuous Monitoring X X
CA-7 (1) Continuous Monitoring |
Independent Assessment
X
CA-8 Penetration Testing X
CA-8 (1) Penetration Testing |
Independent Penetration Agent
or Team
X
CA-9 Internal System Connections X X
CM-1 Configuration Management
Policy and Procedures
X X
CM-2 Baseline Configuration X X
CM-2 (1) Baseline Configuration |
Reviews and Updates
X
CM-2 (2) Baseline Configuration |
Automation Support For
Accuracy / Currency
X
CM-2 (3) Baseline Configuration |
Retention of Previous
Configurations
X
CM-2 (7) Baseline Configuration |
Configure Systems,
Components, or Devices for
High-Risk Areas
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 19 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
92
93
94
95
96
97
CM-3 Configuration Change Control X Requirement: The service provider establishes
a central means of communicating major
changes to or developments in the information
system or environment of operations that may
affect its services to the federal government
and associated service consumers (e.g.,
electronic bulletin board, web status page).
The means of communication are approved and
accepted by the Authorizing Official.
CM-3e Guidance: In accordance with record
retention policies and procedures.
CM-4 Security Impact Analysis X X
CM-5 Access Restrictions For
Change
X
CM-5 (1) Access Restrictions For
Change | Automated Access
Enforcement / Auditing
X
CM-5 (3) Access Restrictions For
Change | Signed Components
X Guidance: If digital signatures/certificates are
unavailable, alternative cryptographic integrity
checks (hashes, self-signed certs, etc.) can be
utilized.
CM-5 (5) Access Restrictions For
Change | Limit Production /
Operational Privileges
X CM-5 (5) (b). [at least quarterly]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 20 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
92
93
94
95
96
97
CM-3 Configuration Change Control X
CM-4 Security Impact Analysis X X
CM-5 Access Restrictions For
Change
X
CM-5 (1) Access Restrictions For
Change | Automated Access
Enforcement / Auditing
X
CM-5 (3) Access Restrictions For
Change | Signed Components
X
CM-5 (5) Access Restrictions For
Change | Limit Production /
Operational Privileges
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 21 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
98
99
100
101
CM-6 Configuration Settings X X CM-6a. [See CM-6(a) Additional FedRAMP
Requirements and Guidance]
CM-6a. Requirement: The service provider shall
use the Center for Internet Security guidelines
(Level 1) to establish configuration settings or
establishes its own configuration settings if
USGCB is not available.
CM-6a. Requirement: The service provider shall
ensure that checklists for configuration settings
are Security Content Automation Protocol
(SCAP) validated or SCAP compatible (if
validated checklists are not available).
CM-6a. Guidance: Information on the USGCB
checklists can be found at:
http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_
usgcbfdcc .
CM-6 (1) Configuration Settings |
Automated Central
Management / Application /
Verification
X
CM-7 Least Functionality X X CM-7. [United States Government
Configuration Baseline (USGCB)]
Requirement: The service provider shall use
the Center for Internet Security guidelines
(Level 1) to establish list of prohibited or
restricted functions, ports, protocols, and/or
services or establishes its own list of prohibited
or restricted functions, ports, protocols, and/or
services if USGCB is not available.
CM-7. Guidance: Information on the USGCB
checklists can be found at:
http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_
usgcbfdcc.
(Partially derived from AC-17(8).)
CM-7 (1) Least Functionality | Periodic
Review
X CM-7(1) [ At least Monthly]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 22 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
98
99
100
101
CM-6 Configuration Settings X X
CM-6 (1) Configuration Settings |
Automated Central
Management / Application /
Verification
X
CM-7 Least Functionality X X
CM-7 (1) Least Functionality | Periodic
Review
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 23 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
102
103
104
105
106
107
108
109
110
111
112
113
CM-7 (2) Least Functionality | Prevent
Program Execution
X CM-7(2) Guidance: This control shall be
implemented in a technical manner on the
information system to only allow programs to
run that adhere to the policy (i.e. white listing).
This control is not to be based off of strictly
written policy on what is allowed or not allowed
to run.
CM-7 (5) Least Functionality | Authorized
Software / Whitelisting
X CM-7(5)[ at least Annually or when there is a
change.]
CM-8 Information System Component
Inventory
X X CM-8b. [at least monthly] CM-8 Requirement: must be provided at least
monthly or when there is a change.
CM-8 (1) Information System Component
Inventory | Updates During
Installations / Removals
X
CM-8 (2) #N/A #N/A #N/A #N/A This is a FedRAMP High Control. Does not
belong here.
CM-8 (3) Information System Component
Inventory | Automated
Unauthorized Component
Detection
X CM-8 (3) (a). [Continuously, using automated
mechanisms with a maximum five-minute delay
in detection.]
CM-8 (5) Information System Component
Inventory | No Duplicate
Accounting of Components
X
CM-9 Configuration Management
Plan
X
CM-10 Software Usage Restrictions X X
CM-10 (1) Software Usage Restrictions |
Open Source Software
X
CM-11 User-Installed Software X X CM-11.c. [Continuously (via CM-7 (5))]
CP-1 Contingency Planning Policy
and Procedures
X X CP-1.b.1 [at least every 3 years]
CP-1.b.2 [at least annually]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 24 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
102
103
104
105
106
107
108
109
110
111
112
113
CM-7 (2) Least Functionality | Prevent
Program Execution
X
CM-7 (5) Least Functionality | Authorized
Software / Whitelisting
X
CM-8 Information System Component
Inventory
X X
CM-8 (1) Information System Component
Inventory | Updates During
Installations / Removals
X
CM-8 (2) #N/A #N/A #N/A
CM-8 (3) Information System Component
Inventory | Automated
Unauthorized Component
Detection
X
CM-8 (5) Information System Component
Inventory | No Duplicate
Accounting of Components
X
CM-9 Configuration Management
Plan
X
CM-10 Software Usage Restrictions X X
CM-10 (1) Software Usage Restrictions |
Open Source Software
X
CM-11 User-Installed Software X X
CP-1 Contingency Planning Policy
and Procedures
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 25 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
114
115
116
117
118
119
120
121
122
123
124
125
CP-2 Contingency Plan X X CP-2d. [at least annually] Requirement: For JAB authorizations the
contingency lists include designated FedRAMP
personnel.
CP-2 (1) Contingency Plan | Coordinate
With Related Plans
X
CP-2 (2) Contingency Plan | Capacity
Planning
X
CP-2 (3) Contingency Plan | Resume
Essential Missions / Business
Functions
X
CP-2 (8) Contingency Plan | Identify
Critical Assets
X
CP-3 Contingency Training X X CP-3.a. [ 10 days]
CP-3.c. [at least annually]
CP-4 Contingency Plan Testing X X CP-4a. [at least annually for moderate impact
systems; at least every three years for low
impact systems] [functional exercises for
moderate impact systems; classroom
exercises/table top written tests for low impact
systems]
CP-4a. Requirement: The service provider
develops test plans in accordance with NIST
Special Publication 800-34 (as amended);
plans are approved by the Authorizing Official
prior to initiating testing.
CP-4 (1) Contingency Plan Testing |
Coordinate With Related Plans
X
CP-6 Alternate Storage Site X
CP-6 (1) Alternate Storage Site |
Separation From Primary Site
X
CP-6 (3) Alternate Storage Site |
Accessibility
X
CP-7 Alternate Processing Site X CP-7a. Requirement: The service provider
defines a time period consistent with the
recovery time objectives and business impact
analysis.
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 26 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
114
115
116
117
118
119
120
121
122
123
124
125
CP-2 Contingency Plan X X
CP-2 (1) Contingency Plan | Coordinate
With Related Plans
X
CP-2 (2) Contingency Plan | Capacity
Planning
X
CP-2 (3) Contingency Plan | Resume
Essential Missions / Business
Functions
X
CP-2 (8) Contingency Plan | Identify
Critical Assets
X
CP-3 Contingency Training X X
CP-4 Contingency Plan Testing X X
CP-4 (1) Contingency Plan Testing |
Coordinate With Related Plans
X
CP-6 Alternate Storage Site X
CP-6 (1) Alternate Storage Site |
Separation From Primary Site
X
CP-6 (3) Alternate Storage Site |
Accessibility
X
CP-7 Alternate Processing Site X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 27 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
126
127
128
129
130
CP-7 (1) Alternate Processing Site |
Separation From Primary Site
X CP-7(1) Guidance: The service provider may
determine what is considered a sufficient
degree of separation between the primary and
alternate processing sites, based on the types
of threats that are of concern. For one particular
type of threat (i.e., hostile cyber attack), the
degree of separation between sites will be less
relevant.
CP-7 (2) Alternate Processing Site |
Accessibility
X
CP-7 (3) Alternate Processing Site |
Priority of Service
X
CP-8 Telecommunications Services X CP-8. Requirement: The service provider
defines a time period consistent with the
business impact analysis.
CP-8 (1) Telecommunications Services |
Priority of Service Provisions
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 28 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
126
127
128
129
130
CP-7 (1) Alternate Processing Site |
Separation From Primary Site
X
CP-7 (2) Alternate Processing Site |
Accessibility
X
CP-7 (3) Alternate Processing Site |
Priority of Service
X
CP-8 Telecommunications Services X
CP-8 (1) Telecommunications Services |
Priority of Service Provisions
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 29 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
131
132
133
134
CP-9 Information System Backup X X CP-9a. [daily incremental; weekly full]
CP-9b. [daily incremental; weekly full]
CP-9c. [daily incremental; weekly full]
CP-9. Requirement: The service provider shall
determine what elements of the cloud
environment require the Information System
Backup control.
Requirement: The service provider shall
determine how Information System Backup is
going to be verified and appropriate periodicity
of the check.
CP-9a. Requirement: The service provider
maintains at least three backup copies of user-
level information (at least one of which is
available online) or provides an equivalent
alternative.
CP-9b. Requirement: The service provider
maintains at least three backup copies of
system-level information (at least one of which
is available online) or provides an equivalent
alternative.
CP-9c. Requirement: The service provider
maintains at least three backup copies of
information system documentation including
security information (at least one of which is
available online) or provides an equivalent
alternative.
CP-9 (1) Information System Backup |
Testing For Reliability / Integrity
X CP-9 (1). [at least annually]
CP-9 (3) Information System Backup |
Separate Storage for Critical
Information
X
CP-10 Information System Recovery
and Reconstitution
X X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 30 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
131
132
133
134
CP-9 Information System Backup X X
CP-9 (1) Information System Backup |
Testing For Reliability / Integrity
X
CP-9 (3) Information System Backup |
Separate Storage for Critical
Information
X
CP-10 Information System Recovery
and Reconstitution
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 31 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
135
136
137
138
139
140
141
142
CP-10 (2) Information System Recovery
and Reconstitution |
Transaction Recovery
X
IA-1 Identification and Authentication
Policy and Procedures
X X IA-1.b.1 [at least every 3 years]
IA-1.b.2 [at least annually]
IA-2 Identification and Authentication
(Organizational Users)
X X
IA-2 (1) Identification and Authentication
(Organizational Users) |
Network Access to Privileged
Accounts
X X
IA-2 (2) Identification and Authentication
(Organizational Users) |
Network Access to Non-
Privileged Accounts
X
IA-2 (3) Identification and Authentication
(Organizational Users) | Local
Access to Privileged Accounts
X
IA-2 (5) Identification and Authentication
(Organizational Users) | Group
Authentication
X
IA-2 (8) Identification and Authentication
(Organizational Users) |
Network Access to Privileged
Accounts - Replay Resistant
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 32 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
135
136
137
138
139
140
141
142
CP-10 (2) Information System Recovery
and Reconstitution |
Transaction Recovery
X
IA-1 Identification and Authentication
Policy and Procedures
X X
IA-2 Identification and Authentication
(Organizational Users)
X X
IA-2 (1) Identification and Authentication
(Organizational Users) |
Network Access to Privileged
Accounts
X X
IA-2 (2) Identification and Authentication
(Organizational Users) |
Network Access to Non-
Privileged Accounts
X
IA-2 (3) Identification and Authentication
(Organizational Users) | Local
Access to Privileged Accounts
X
IA-2 (5) Identification and Authentication
(Organizational Users) | Group
Authentication
X
IA-2 (8) Identification and Authentication
(Organizational Users) |
Network Access to Privileged
Accounts - Replay Resistant
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 33 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
143
144
145
146
147
148
149
150
151
IA-2 (11) Identification and Authentication
(Organizational Users) |
Remote Access - Separate
Device
X The information system implements multifactor
authentication for remote access to privileged
and non-privileged accounts such that one of
the factors is provided by a device separate
from the system gaining access and the device
meets [Assignment: organization-defined
strength of mechanism requirements].
IA-2 (12) Identification and Authentication
(Organizational Users) |
Acceptance of PIV Credentials
X X Guidance: Include Common Access Card
(CAC), i.e., the DoD technical implementation
of PIV/FIPS 201/HSPD-12.
IA-3 Device Identification and
Authentication
X
IA-4 Identifier Management X X IA-4d. [at least two years]
IA-4e. [ninety days for user identifiers] (See
additional requirements and guidance.)
IA-4e. Requirement: The service provider
defines time period of inactivity for device
identifiers.
IA-4 (4) Identifier Management | Identify
User Status
X IA-4 (4). [contractors; foreign nationals]
IA-5 Authenticator Management X X IA-5g. [to include sixty days for passwords]
IA-5 (1) Authenticator Management |
Password-Based Authentication
X X IA-5 (1) (a). [case sensitive, minimum of twelve
characters, and at least one each of upper-case
letters, lower-case letters, numbers, and special
characters]
IA-5 (1) (b). [at least one]
IA-5 (1) (d). [one day minimum, sixty day
maximum]
IA-5 (1) (e). [twenty four]
IA-5 (2) Authenticator Management |
PKI-Based Authentication
X
IA-5 (3) Authenticator Management | In-
Person or Trusted Third-Party
Registration
X IA-5 (3). [All hardware/biometric (multifactor
authenticators] [in person]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 34 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
143
144
145
146
147
148
149
150
151
IA-2 (11) Identification and Authentication
(Organizational Users) |
Remote Access - Separate
Device
X
IA-2 (12) Identification and Authentication
(Organizational Users) |
Acceptance of PIV Credentials
X X
IA-3 Device Identification and
Authentication
X
IA-4 Identifier Management X X
IA-4 (4) Identifier Management | Identify
User Status
X
IA-5 Authenticator Management X X
IA-5 (1) Authenticator Management |
Password-Based Authentication
X X
IA-5 (2) Authenticator Management |
PKI-Based Authentication
X
IA-5 (3) Authenticator Management | In-
Person or Trusted Third-Party
Registration
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 35 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
152
153
154
155
156
157
158
159
160
IA-5 (4) Authenticator Management |
Automated Support for
Password Strength
Determination
X IA-4e Additional FedRAMP Requirements and
Guidance: Guidance: If automated mechanisms
which enforce password authenticator strength
at creation are not used, automated
mechanisms must be used to audit strength of
created password authenticators
IA-5 (6) Authenticator Management |
Protection of Authenticators
X
IA-5 (7) Authenticator Management | No
Embedded Unencrypted Static
Authenticators
X
IA-5 (11) Authenticator Management |
Hardware Token-Based
Authentication
X X
IA-6 Authenticator Feedback X X
IA-7 Cryptographic Module
Authentication
X X
IA-8 Identification and Authentication
(Non-Organizational Users)
X X
IA-8 (1) Identification and Authentication
(Non-Organizational Users) |
Acceptance of PIV Credentials
from Other Agencies
X X
IA-8 (2) Identification and Authentication
(Non-Organizational Users) |
Acceptance of Third-Party
Credentials
X X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 36 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
152
153
154
155
156
157
158
159
160
IA-5 (4) Authenticator Management |
Automated Support for
Password Strength
Determination
X
IA-5 (6) Authenticator Management |
Protection of Authenticators
X
IA-5 (7) Authenticator Management | No
Embedded Unencrypted Static
Authenticators
X
IA-5 (11) Authenticator Management |
Hardware Token-Based
Authentication
X X
IA-6 Authenticator Feedback X X
IA-7 Cryptographic Module
Authentication
X X
IA-8 Identification and Authentication
(Non-Organizational Users)
X X
IA-8 (1) Identification and Authentication
(Non-Organizational Users) |
Acceptance of PIV Credentials
from Other Agencies
X X
IA-8 (2) Identification and Authentication
(Non-Organizational Users) |
Acceptance of Third-Party
Credentials
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 37 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
161
162
163
164
165
166
167
168
IA-8 (3) Identification and Authentication
(Non-Organizational Users) |
Use of FICAM-Approved
Products
X X
IA-8 (4) Identification and Authentication
(Non-Organizational Users) |
Use of FICAM-Issued Profiles
X X
IR-1 Incident Response Policy and
Procedures
X X IR-1.b.1 [at least every 3 years]
IR-1.b.2 [at least annually]
IR-2 Incident Response Training X X IR-2b. [at least annually]
IR-3 Incident Response Testing X IR-3. [at least annually] IR-3. Requirement: The service provider
defines tests and/or exercises in accordance
with NIST Special Publication 800-61 (as
amended).
Requirement: For JAB Authorization, the
service provider provides test plans to the
Authorizing Official (AO) annually.
Requirement: Test plans are approved and
accepted by the Authorizing Official prior to test
commencing.
IR-3 (2) Incident Response Testing |
Coordination With Related
Plans
X
IR-4 Incident Handling X X IR-4/A13. Requirement: The service provider
ensures that individuals conducting incident
handling meet personnel security requirements
commensurate with the criticality/sensitivity of
the information being processed, stored, and
transmitted by the information system.
IR-4 (1) Incident Handling | Automated
Incident Handling Processes
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 38 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
161
162
163
164
165
166
167
168
IA-8 (3) Identification and Authentication
(Non-Organizational Users) |
Use of FICAM-Approved
Products
X X
IA-8 (4) Identification and Authentication
(Non-Organizational Users) |
Use of FICAM-Issued Profiles
X X
IR-1 Incident Response Policy and
Procedures
X X
IR-2 Incident Response Training X X
IR-3 Incident Response Testing X
IR-3 (2) Incident Response Testing |
Coordination With Related
Plans
X
IR-4 Incident Handling X X
IR-4 (1) Incident Handling | Automated
Incident Handling Processes
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 39 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
169
170
171
172
173
174
175
176
177
178
179
IR-5 Incident Monitoring X X
IR-6 Incident Reporting X X IR-6a. [US-CERT incident reporting timelines as
specified in NIST Special Publication 800-61
(as amended)]
Requirement: Reports security incident
information according to FedRAMP Incident
Communications Procedure.
IR-6 (1) Incident Reporting | Automated
Reporting
X
IR-7 Incident Response Assistance X X
IR-7 (1) Incident Response Assistance |
Automation Support For
Availability of Information /
Support
X
IR-7 (2) Incident Response Assistance |
Coordination With External
Providers
X
IR-8 Incident Response Plan X X IR-8c. [at least annually] IR-8(b) Additional FedRAMP Requirements and
Guidance: The service provider defines a list of
incident response personnel (identified by
name and/or by role) and organizational
elements. The incident response list includes
designated FedRAMP personnel.
IR-8(e) Additional FedRAMP Requirements and
Guidance: The service provider defines a list of
incident response personnel (identified by
name and/or by role) and organizational
elements. The incident response list includes
designated FedRAMP personnel.
IR-9 Information Spillage Response X
IR-9 (1) Information Spillage Response |
Responsible Personnel
X
IR-9 (2) Information Spillage Response |
Training
X
IR-9 (3) Information Spillage Response |
Post-Spill Operations
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 40 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
169
170
171
172
173
174
175
176
177
178
179
IR-5 Incident Monitoring X X
IR-6 Incident Reporting X X
IR-6 (1) Incident Reporting | Automated
Reporting
X
IR-7 Incident Response Assistance X X
IR-7 (1) Incident Response Assistance |
Automation Support For
Availability of Information /
Support
X
IR-7 (2) Incident Response Assistance |
Coordination With External
Providers
X
IR-8 Incident Response Plan X X
IR-9 Information Spillage Response X
IR-9 (1) Information Spillage Response |
Responsible Personnel
X
IR-9 (2) Information Spillage Response |
Training
X
IR-9 (3) Information Spillage Response |
Post-Spill Operations
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 41 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
IR-9 (4) Information Spillage Response |
Exposure to Unauthorized
Personnel
X
MA-1 System Maintenance Policy
and Procedures
X X MA-1.b.1 [at least every 3 years]
MA-1.b.2 [at least annually]
MA-2 Controlled Maintenance X X
MA-3 Maintenance Tools X
MA-3 (1) Maintenance Tools | Inspect
Tools
X
MA-3 (2) Maintenance Tools | Inspect
Media
X
MA-3 (3) Maintenance Tools | Prevent
Unauthorized Removal
X MA-3 (3) (d). [the information owner explicitly
authorizing removal of the equipment from the
facility]
MA-4 Nonlocal Maintenance X X
MA-4 (2) Nonlocal Maintenance |
Document Nonlocal
Maintenance
X
MA-5 Maintenance Personnel X X
MA-5 (1) Maintenance Personnel |
Individuals Without Appropriate
Access
X Requirement: Only MA-5 (1)(a)(1) is required by
FedRAMP Moderate Baseline
MA-6 Timely Maintenance X
MP-1 Media Protection Policy and
Procedures
X X MP-1.b.1 [at least every 3 years]
MP-1.b.2 [at least annually]
MP-2 Media Access X X
MP-3 Media Marking X MP-3b. [no removable media types] MP-3b. Guidance: Second parameter not-
applicable
MP-4 Media Storage X MP-4a. [all types of digital and non-digital
media with sensitive information] within
[FedRAMP Assignment: see additional
FedRAMP requirements and guidance];
MP-4a Additional FedRAMP Requirements and
Guidance: Requirement: The service provider
defines controlled areas within facilities where
the information and information system reside.
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 42 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
IR-9 (4) Information Spillage Response |
Exposure to Unauthorized
Personnel
X
MA-1 System Maintenance Policy
and Procedures
X X
MA-2 Controlled Maintenance X X
MA-3 Maintenance Tools X
MA-3 (1) Maintenance Tools | Inspect
Tools
X
MA-3 (2) Maintenance Tools | Inspect
Media
X
MA-3 (3) Maintenance Tools | Prevent
Unauthorized Removal
X
MA-4 Nonlocal Maintenance X X
MA-4 (2) Nonlocal Maintenance |
Document Nonlocal
Maintenance
X
MA-5 Maintenance Personnel X X
MA-5 (1) Maintenance Personnel |
Individuals Without Appropriate
Access
X
MA-6 Timely Maintenance X
MP-1 Media Protection Policy and
Procedures
X X
MP-2 Media Access X X
MP-3 Media Marking X
MP-4 Media Storage X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 43 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
196
197
198
199
200
201
202
203
MP-5 Media Transport X MP-5a. [all media with sensitive information]
[prior to leaving secure/controlled environment:
for digital media, encryption using a FIPS 140-2
validated encryption module; for non-digital
media, secured in locked container]
MP-5 (4) Media Transport |
Cryptographic Protection
X
MP-6 Media Sanitization X X The organization: a. Sanitizes [Assignment:
organization-defined information system media]
prior to disposal, release out of organizational
control, or release for reuse using [Assignment:
organization-defined sanitization techniques
and procedures] in accordance with applicable
federal and organizational standards and
policies; and b. Employs sanitization
mechanisms with the strength and integrity
commensurate with the security category or
classification of the information.
MP-6 (2) Media Sanitization | Equipment
Testing
X [At least annually] Guidance: Equipment and procedures may be
tested or validated for effectiveness
MP-7 Media Use X X
MP-7 (1) Media Use | Prohibit Use
without Owner
X
PE-1 Physical and Environmental
Protection Policy and
Procedures
X X PE-1.b.1 [at least every 3 years]
PE-1.b.2 [at least annually]
PE-2 Physical Access Authorizations X X PE-2c. [at least annually]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 44 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
196
197
198
199
200
201
202
203
MP-5 Media Transport X
MP-5 (4) Media Transport |
Cryptographic Protection
X
MP-6 Media Sanitization X X
MP-6 (2) Media Sanitization | Equipment
Testing
X
MP-7 Media Use X X
MP-7 (1) Media Use | Prohibit Use
without Owner
X
PE-1 Physical and Environmental
Protection Policy and
Procedures
X X
PE-2 Physical Access Authorizations X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 45 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
204
205
206
207
208
209
210
211
212
213
214
215
216
PE-3 Physical Access Control X X PE-3a.2 [CSP defined physical access control
systems/devices AND guards]
PE-3d. [in all circumstances within restricted
access area where the information system
resides]
PE-3f. [at least annually]
PE-3g. [at least annually]
PE-4 Access Control For
Transmission Medium
X
PE-5 Access Control For Output
Devices
X
PE-6 Monitoring Physical Access X X PE-6b.[at least monthly]
PE-6 (1) Monitoring Physical Access |
Intrusion Alarms / Surveillance
Equipment
X
PE-8 Visitor Access Records X X PE-8a [for a minimum of one year]
PE-8b. [at least monthly]
PE-9 Power Equipment and Cabling X
PE-10 Emergency Shutoff X
PE-11 Emergency Power X
PE-12 Emergency Lighting X X
PE-13 Fire Protection X X
PE-13 (2) Fire Protection | Suppression
Devices / Systems
X
PE-13 (3) Fire Protection | Automatic Fire
Suppression
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 46 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
204
205
206
207
208
209
210
211
212
213
214
215
216
PE-3 Physical Access Control X X
PE-4 Access Control For
Transmission Medium
X
PE-5 Access Control For Output
Devices
X
PE-6 Monitoring Physical Access X X
PE-6 (1) Monitoring Physical Access |
Intrusion Alarms / Surveillance
Equipment
X
PE-8 Visitor Access Records X X
PE-9 Power Equipment and Cabling X
PE-10 Emergency Shutoff X
PE-11 Emergency Power X
PE-12 Emergency Lighting X X
PE-13 Fire Protection X X
PE-13 (2) Fire Protection | Suppression
Devices / Systems
X
PE-13 (3) Fire Protection | Automatic Fire
Suppression
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 47 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
217
218
219
220
221
222
223
224
225
226
227
228
229
PE-14 Temperature and Humidity
Controls
X X PE-14a. [consistent with American Society of
Heating, Refrigerating and Air-conditioning
Engineers (ASHRAE) document entitled
Thermal Guidelines for Data Processing
Environments]
PE-14b. [continuously]
PE-14a. Requirements: The service provider
measures temperature at server inlets and
humidity levels by dew point.
PE-14 (2) Temperature and Humidity
Controls | Monitoring With
Alarms / Notifications
X
PE-15 Water Damage Protection X X
PE-16 Delivery and Removal X X PE-16. [all information system components]
PE-17 Alternate Work Site X
PL-1 Security Planning Policy and
Procedures
X X PL-1.b.1 [at least every 3 years]
PL-1.b.2 [at least annually]
PL-2 System Security Plan X X PL-2c. [at least annually]
PL-2 (3) System Security Plan | Plan /
Coordinate With Other
Organizational Entities
X
PL-4 Rules of Behavior X X PL-4c. [At least every 3 years]
PL-4 (1) Rules of Behavior | Social
Media and Networking
Restrictions
X
PL-8 Information Security
Architecture
X PL-8b. [At least annually]
PS-1 Personnel Security Policy and
Procedures
X X PS-1.b.1 [at least every 3 years]
PS-1.b.2 [at least annually]
PS-2 Position Risk Designation X X PS-2c. [at least every three years]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 48 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
217
218
219
220
221
222
223
224
225
226
227
228
229
PE-14 Temperature and Humidity
Controls
X X
PE-14 (2) Temperature and Humidity
Controls | Monitoring With
Alarms / Notifications
X
PE-15 Water Damage Protection X X
PE-16 Delivery and Removal X X
PE-17 Alternate Work Site X
PL-1 Security Planning Policy and
Procedures
X X
PL-2 System Security Plan X X
PL-2 (3) System Security Plan | Plan /
Coordinate With Other
Organizational Entities
X
PL-4 Rules of Behavior X X
PL-4 (1) Rules of Behavior | Social
Media and Networking
Restrictions
X
PL-8 Information Security
Architecture
X
PS-1 Personnel Security Policy and
Procedures
X X
PS-2 Position Risk Designation X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 49 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
230
231
232
233
234
235
236
237
238
239
PS-3 Personnel Screening X X PS-3b. [for national security clearances; a
reinvestigation is required during the 5th year
for top secret security clearance, the 10th year
for secret security clearance, and 15th year for
confidential security clearance.
For moderate risk law enforcement and high
impact public trust level, a reinvestigation is
required during the 5th year. There is no
reinvestigation for other moderate risk positions
or any low risk positions]
PS-3 (3) Personnel Screening |
Information With Special
Protection Measures
X PS-3 (3)(b). [personnel screening criteria – as
required by specific information]
PS-4 Personnel Termination X X PS-4.a. [same day]
PS-5 Personnel Transfer X X PS-5. [within five days of the formal transfer
action (DoD 24 hours)]
PS-6 Access Agreements X X PS-6b. [at least annually]
PS-6c.2. [at least annually]
PS-7 Third-Party Personnel Security X X PS-7d. organization-defined time period – same
day
PS-8 Personnel Sanctions X X
RA-1 Risk Assessment Policy and
Procedures
X X RA-1.b.1 [at least every 3 years]
RA-1.b.2 [at least annually]
RA-2 Security Categorization X X
RA-3 Risk Assessment X X RA-3b. [security assessment report]
RA-3c. [at least every three years or when a
significant change occurs]
RA-3e. [at least every three years or when a
significant change occurs]
Guidance: Significant change is defined in NIST
Special Publication 800-37 Revision 1,
Appendix F.
RA-3d. Requirement: to include the Authorizing
Official; for JAB authorizations to include
FedRAMP
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 50 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
230
231
232
233
234
235
236
237
238
239
PS-3 Personnel Screening X X
PS-3 (3) Personnel Screening |
Information With Special
Protection Measures
X
PS-4 Personnel Termination X X
PS-5 Personnel Transfer X X
PS-6 Access Agreements X X
PS-7 Third-Party Personnel Security X X
PS-8 Personnel Sanctions X X
RA-1 Risk Assessment Policy and
Procedures
X X
RA-2 Security Categorization X X
RA-3 Risk Assessment X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 51 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
240
241
242
243
244
245
246
247
248
249
RA-5 Vulnerability Scanning X X RA-5a. [monthly operating
system/infrastructure; monthly web applications
and databases]
RA-5d. [high-risk vulnerabilities mitigated within
thirty days from date of discovery; moderate-
risk vulnerabilities mitigated within ninety days
from date of discovery]
RA-5a. Requirement: an accredited
independent assessor scans operating
systems/infrastructure, web applications, and
databases once annually.
RA-5e. Requirement: to include the Risk
Executive; for JAB authorizations to include
FedRAMP
RA-5 (1) Vulnerability Scanning | Update
Tool Capability
X
RA-5 (2) Vulnerability Scanning | Update
by Frequency / Prior to New
Scan / When Identified
X RA-5 (2). [prior to a new scan]
RA-5 (3) Vulnerability Scanning |
Breadth / Depth of Coverage
X
RA-5 (5) Vulnerability Scanning |
Privileged Access
X RA-5 (5). [operating systems / web applications
/ databases] [all scans]
RA-5 (6) Vulnerability Scanning |
Automated Trend Analyses
X RA-5(6) Guidance: include in Continuous
Monitoring ISSO digest/report to Authorizing
Official
RA-5 (8) Vulnerability Scanning | Review
Historic Audit Logs
X RA-5 (8). Requirements: This enhancement is
required for all high vulnerability scan findings.
Guidance: While scanning tools may lable
findings as high or critical, the intent of the
control is based around NIST's definition of high
vulnerability.
SA-1 System and Services
Acquisition Policy and
Procedures
X X SA-1.b.1 [at least every 3 years]
SA-1.b.2 [at least annually]
SA-2 Allocation of Resources X X
SA-3 System Development Life Cycle X X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 52 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
240
241
242
243
244
245
246
247
248
249
RA-5 Vulnerability Scanning X X
RA-5 (1) Vulnerability Scanning | Update
Tool Capability
X
RA-5 (2) Vulnerability Scanning | Update
by Frequency / Prior to New
Scan / When Identified
X
RA-5 (3) Vulnerability Scanning |
Breadth / Depth of Coverage
X
RA-5 (5) Vulnerability Scanning |
Privileged Access
X
RA-5 (6) Vulnerability Scanning |
Automated Trend Analyses
X
RA-5 (8) Vulnerability Scanning | Review
Historic Audit Logs
X
SA-1 System and Services
Acquisition Policy and
Procedures
X X
SA-2 Allocation of Resources X X
SA-3 System Development Life Cycle X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 53 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
250
251
252
253
254
255
256
257
258
SA-4 Acquisition Process X X SA-4. Guidance: The use of Common Criteria
(ISO/IEC 15408) evaluated products is strongly
preferred.
See http://www.niap-ccevs.org/vpl or
http://www.commoncriteriaportal.org/products.ht
ml.
SA-4 (1) Acquisition Process |
Functional Properties of
Security Controls
X
SA-4 (2) Acquisition Process | Design /
Implementation Information for
Security Controls
X [to include security-relevant external system
interfaces and high-level design]
SA-4 (8) Acquisition Process |
Continuous Monitoring Plan
X SA-4 (8). [at least the minimum requirement as
defined in control CA-7]
SA-4 (8) Guidance: CSP must use the same
security standards regardless of where the
system component or information system
service is aquired.
SA-4 (9) Acquisition Process | Functions
/ Ports / Protocols / Services in
Use
X
SA-4 (10) Acquisition Process | Use of
Approved PIV Products
X X
SA-5 Information System
Documentation
X X
SA-8 Security Engineering Principles X
SA-9 External Information System
Services
X X SA-9a. [FedRAMP Security Controls
Baseline(s) if Federal information is processed
or stored within the external system]
SA-9c. [Federal/FedRAMP Continuous
Monitoring requirements must be met for
external systems where Federal information is
processed or stored]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 54 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
250
251
252
253
254
255
256
257
258
SA-4 Acquisition Process X X
SA-4 (1) Acquisition Process |
Functional Properties of
Security Controls
X
SA-4 (2) Acquisition Process | Design /
Implementation Information for
Security Controls
X
SA-4 (8) Acquisition Process |
Continuous Monitoring Plan
X
SA-4 (9) Acquisition Process | Functions
/ Ports / Protocols / Services in
Use
X
SA-4 (10) Acquisition Process | Use of
Approved PIV Products
X X
SA-5 Information System
Documentation
X X
SA-8 Security Engineering Principles X
SA-9 External Information System
Services
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 55 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
259
260
261
262
263
264
265
266
267
SA-9 (1) External Information Systems |
Risk Assessments /
Organizational Approvals
X SA-9 (1) see Additional Requirement and
Guidance
SA-9 (1). Requirement: The service provider
documents all existing outsourced security
services and conducts a risk assessment of
future outsourced security services. For JAB
authorizations, future planned outsourced
services are approved and accepted by the
JAB.
SA-9 (2) External Information Systems |
Identification of Functions /
Ports / Protocols / Services
X SA-9 (2). [All external systems where Federal
information is processed, transmitted or stored]
SA-9 (4) External Information Systems |
Consistent Interests of
Consumers and Providers
X SA-9 (4). [All external systems where Federal
information is processed, transmitted or stored]
SA-9 (5) External Information Systems |
Processing, Storage, and
Service Location
X SA-9 (5). [information processing, transmission,
information data, AND information services]
SA-10 Developer Configuration
Management
X SA-10a. [development, implementation, AND
operation]
SA-10e. Requirement: for JAB authorizations,
track security flaws and flaw resolution within
the system, component, or service and report
findings to organization-defined personnel, to
include FedRAMP.
SA-10 (1) Developer Configuration
Management | Software /
Firmware Integrity Verification
X
SA-11 Developer Security Testing and
Evaluation
X
SA-11 (1) Developer Security Testing and
Evaluation | Static Code
Analysis
X Requirement: SA-11 (1) or SA-11 (8) or both
Requirement: The service provider documents
in the Continuous Monitoring Plan, how newly
developed code for the information system is
reviewed.
SA-11 (2) Developer Security Testing and
Evaluation | Threat and
Vulnerability Analyses
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 56 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
259
260
261
262
263
264
265
266
267
SA-9 (1) External Information Systems |
Risk Assessments /
Organizational Approvals
X
SA-9 (2) External Information Systems |
Identification of Functions /
Ports / Protocols / Services
X
SA-9 (4) External Information Systems |
Consistent Interests of
Consumers and Providers
X
SA-9 (5) External Information Systems |
Processing, Storage, and
Service Location
X
SA-10 Developer Configuration
Management
X
SA-10 (1) Developer Configuration
Management | Software /
Firmware Integrity Verification
X
SA-11 Developer Security Testing and
Evaluation
X
SA-11 (1) Developer Security Testing and
Evaluation | Static Code
Analysis
X
SA-11 (2) Developer Security Testing and
Evaluation | Threat and
Vulnerability Analyses
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 57 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
268
269
270
271
272
273
274
275
276
277
278
279
280
SA-11 (8) Developer Security Testing and
Evaluation | Dynamic Code
Analysis
X Requirement: SA-11 (1) or SA-11 (8) or both
Requirement: The service provider documents
in the Continuous Monitoring Plan, how newly
developed code for the information system is
reviewed.
SC-1 System and Communications
Protection Policy and
Procedures
X X SC-1.b.1 [at least every 3 years]
SC-1.b.2 [at least annually]
SC-2 Application Partitioning X
SC-4 Information In Shared
Resources
X
SC-5 Denial of Service Protection X X
SC-6 Resource Availability X
SC-7 Boundary Protection X X
SC-7 (3) Boundary Protection | Access
Points
X
SC-7 (4) Boundary Protection | External
Telecommunications Services
X SC-7 (4). [at least annually]
SC-7 (5) Boundary Protection | Deny by
Default / Allow by Exception
X
SC-7 (7) Boundary Protection | Prevent
Split Tunneling for Remote
Devices
X
SC-7 (8) Boundary Protection | Route
Traffic to Authenticated Proxy
Servers
X
SC-7 (12) Boundary Protection | Host-
Based Protection
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 58 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
268
269
270
271
272
273
274
275
276
277
278
279
280
SA-11 (8) Developer Security Testing and
Evaluation | Dynamic Code
Analysis
X
SC-1 System and Communications
Protection Policy and
Procedures
X X
SC-2 Application Partitioning X
SC-4 Information In Shared
Resources
X
SC-5 Denial of Service Protection X X
SC-6 Resource Availability X
SC-7 Boundary Protection X X
SC-7 (3) Boundary Protection | Access
Points
X
SC-7 (4) Boundary Protection | External
Telecommunications Services
X
SC-7 (5) Boundary Protection | Deny by
Default / Allow by Exception
X
SC-7 (7) Boundary Protection | Prevent
Split Tunneling for Remote
Devices
X
SC-7 (8) Boundary Protection | Route
Traffic to Authenticated Proxy
Servers
X
SC-7 (12) Boundary Protection | Host-
Based Protection
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 59 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
281
282
283
284
285
286
287
288
289
290
SC-7 (13) Boundary Protection | Isolation
of Security Tools / Mechanisms
/ Support Components
X SC-7 (13). Requirement: The service provider
defines key information security tools,
mechanisms, and support components
associated with system and security
administration and isolates those tools,
mechanisms, and support components from
other internal information system components
via physically or logically separate subnets.
SC-7 (18) Boundary Protection | Fail
Secure
X
SC-8 Transmission Confidentiality
and Integrity
X SC-8. [confidentiality AND integrity]
SC-8 (1) Transmission Confidentiality
and Integrity | Cryptographic or
Alternate Physical Protection
X SC-8 (1). [prevent unauthorized disclosure of
information AND detect changes to information]
[a hardened or alarmed carrier Protective
Distribution System (PDS)]
SC-10 Network Disconnect X SC-10. [no longer than 30 minutes for RAS-
based sessions or no longer than 60 minutes
for non-interactive user sessions]
SC-12 Cryptographic Key
Establishment and
Management
X X SC-12 Guidance: Federally approved
cryptography
SC-12 (2) Cryptographic Key
Establishment and
Management | Symmetric Keys
X SC-12 (2). [NIST FIPS-compliant]
SC-12 (3) Cryptographic Key
Establishment and
Management | Asymmetric
Keys
X
SC-13 Cryptographic Protection X X [FIPS-validated or NSA-approved cryptography]
SC-15 Collaborative Computing
Devices
X X SC-15a. [no exceptions]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 60 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
281
282
283
284
285
286
287
288
289
290
SC-7 (13) Boundary Protection | Isolation
of Security Tools / Mechanisms
/ Support Components
X
SC-7 (18) Boundary Protection | Fail
Secure
X
SC-8 Transmission Confidentiality
and Integrity
X
SC-8 (1) Transmission Confidentiality
and Integrity | Cryptographic or
Alternate Physical Protection
X
SC-10 Network Disconnect X
SC-12 Cryptographic Key
Establishment and
Management
X X
SC-12 (2) Cryptographic Key
Establishment and
Management | Symmetric Keys
X
SC-12 (3) Cryptographic Key
Establishment and
Management | Asymmetric
Keys
X
SC-13 Cryptographic Protection X X
SC-15 Collaborative Computing
Devices
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 61 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
291
292
293
294
295
296
297
298
299
300
301
302
303
304
SC-17 Public Key Infrastructure
Certificates
X
SC-18 Mobile Code X
SC-19 Voice Over Internet Protocol X
SC-20 Secure Name / Address
Resolution Service
(Authoritative Source)
X X
SC-21 Secure Name / Address
Resolution Service (Recursive
or Caching Resolver)
X X
SC-22 Architecture and Provisioning
for Name / Address Resolution
Service
X X
SC-23 Session Authenticity X
SC-28 Protection of Information At
Rest
X SC-28. [confidentiality AND integrity] SC-28. Guidance: The organization supports
the capability to use cryptographic mechanisms
to protect information at rest.
SC-28 (1) Protection Of Information At
Rest | Cryptographic Protection
X
SC-39 Process Isolation X X
SI-1 System and Information
Integrity Policy and Procedures
X X SI-1.b.1 [at least every 3 years]
SI-1.b.2 [at least annually]
SI-2 Flaw Remediation X X SI-2c. [Within 30 days of release of updates]
SI-2 (2) Flaw Remediation | Automated
Flaw Remediation Status
X SI-2 (2). [at least monthly]
SI-2 (3) Flaw Remediation | Time to
Remediate Flaws / Benchmarks
for Corrective Actions
X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 62 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
291
292
293
294
295
296
297
298
299
300
301
302
303
304
SC-17 Public Key Infrastructure
Certificates
X
SC-18 Mobile Code X
SC-19 Voice Over Internet Protocol X
SC-20 Secure Name / Address
Resolution Service
(Authoritative Source)
X X
SC-21 Secure Name / Address
Resolution Service (Recursive
or Caching Resolver)
X X
SC-22 Architecture and Provisioning
for Name / Address Resolution
Service
X X
SC-23 Session Authenticity X
SC-28 Protection of Information At
Rest
X
SC-28 (1) Protection Of Information At
Rest | Cryptographic Protection
X
SC-39 Process Isolation X X
SI-1 System and Information
Integrity Policy and Procedures
X X
SI-2 Flaw Remediation X X
SI-2 (2) Flaw Remediation | Automated
Flaw Remediation Status
X
SI-2 (3) Flaw Remediation | Time to
Remediate Flaws / Benchmarks
for Corrective Actions
X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 63 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
305
306
307
308
309
310
311
312
313
314
315
316
317
SI-3 Malicious Code Protection X X SI-3.c.1 [at least weekly] [to include endpoints]
SI-3.c.2 [to include alerting administrator or
defined security personnel]
SI-3 (1) Malicious Code Protection |
Central Management
X
SI-3 (2) Malicious Code Protection |
Automatic Updates
X
SI-3 (7) Malicious Code Protection |
Nonsignature-Based Detection
X
SI-4 Information System Monitoring X X
SI-4 (1) Information System Monitoring |
System-Wide Intrusion
Detection System
X
SI-4 (2) Information System Monitoring |
Automated Tools For Real-
Time Analysis
X
SI-4 (4) Information System Monitoring |
Inbound and Outbound
Communications Traffic
X SI-4 (4). [continually]
SI-4 (5) Information System Monitoring |
System-Generated Alerts
X SI-4(5) Guidance: In accordance with the
incident response plan.
SI-4 (14) Information System Monitoring |
Wireless Intrusion Detection
X
SI-4 (16) Information System Monitoring |
Correlate Monitoring
Information
X
SI-4 (23) Information System Monitoring |
Host-Based Devices
X
SI-5 Security Alerts, Advisories, and
Directives
X X SI-5a. [to include US-CERT]
SI-5c. [to include system security personnel
and administrators with configuration/patch-
management responsibilities]
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 64 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
305
306
307
308
309
310
311
312
313
314
315
316
317
SI-3 Malicious Code Protection X X
SI-3 (1) Malicious Code Protection |
Central Management
X
SI-3 (2) Malicious Code Protection |
Automatic Updates
X
SI-3 (7) Malicious Code Protection |
Nonsignature-Based Detection
X
SI-4 Information System Monitoring X X
SI-4 (1) Information System Monitoring |
System-Wide Intrusion
Detection System
X
SI-4 (2) Information System Monitoring |
Automated Tools For Real-
Time Analysis
X
SI-4 (4) Information System Monitoring |
Inbound and Outbound
Communications Traffic
X
SI-4 (5) Information System Monitoring |
System-Generated Alerts
X
SI-4 (14) Information System Monitoring |
Wireless Intrusion Detection
X
SI-4 (16) Information System Monitoring |
Correlate Monitoring
Information
X
SI-4 (23) Information System Monitoring |
Host-Based Devices
X
SI-5 Security Alerts, Advisories, and
Directives
X X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 65 of 66
2
3
A B C D E F G H I J K
Base Parameters Implementation Status
Control
ID
Control Title Low Mod
FedRAMP Defined Assignment/Selection
Parameters
Additional FedRAMP Requirements And
Guidance
In
Place
Partially
Implemented
Planned
Alternative
Implementation
N/A
318
319
320
321
322
323
324
325
326
327
328
SI-6 Security Function Verification X SI-6b [to include upon system startup and/or
restart at least monthly]
SI-6c [to include system administrators and
security personnel]
SI-6d [to include notification of system
administrators and security personnel]
SI-7 Software, Firmware, and
Information Integrity
X
SI-7 (1) Software, Firmware, and
Information Integrity | Integrity
Checks
X SI-7 (1). [Selection to include security relevant
events and at least monthly]
SI-7 (7) Software, Firmware, and
Information Integrity |
Integration of Detection and
Response
X
SI-8 Spam Protection X
SI-8 (1) Spam Protection | Central
Management
X
SI-8 (2) Spam Protection | Automatic
Updates
X
SI-10 Information Input Validation X
SI-11 Error Handling X
SI-12 Information Handling and
Retention
X X
SI-16 Memory Protection X
FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 66 of 66
2
3
A B C D
Base
Control
ID
Control Title Low Mod
318
319
320
321
322
323
324
325
326
327
328
SI-6 Security Function Verification X
SI-7 Software, Firmware, and
Information Integrity
X
SI-7 (1) Software, Firmware, and
Information Integrity | Integrity
Checks
X
SI-7 (7) Software, Firmware, and
Information Integrity |
Integration of Detection and
Response
X
SI-8 Spam Protection X
SI-8 (1) Spam Protection | Central
Management
X
SI-8 (2) Spam Protection | Automatic
Updates
X
SI-10 Information Input Validation X
SI-11 Error Handling X
SI-12 Information Handling and
Retention
X X
SI-16 Memory Protection X
L M N O P Q R
Control Origination
Service Provider-
Corporate
Service Provider-
System Specific
Service Provider Hybrid:
(Service Provider - Corporate
and Service Provider - System
Specific)
Configured by
Customer
(Customer -
System Specific)
Provided by
Customer
(Customer- System
Specific)
Shared
(Service Provider
and Customer
Responsibility)
Inherited from Pre-
Existing
Provisional
Authorization

Mais conteúdo relacionado

Mais procurados

QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdfPencilData
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations centerCyberhat
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
Deploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA FirewallDeploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA FirewallKHNOG
 
Splunk at Airbus
Splunk at AirbusSplunk at Airbus
Splunk at AirbusSplunk
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxSWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxMdMofijulHaque
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 

Mais procurados (20)

QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations center
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
Deploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA FirewallDeploy Failover/High Availability in ASA Firewall
Deploy Failover/High Availability in ASA Firewall
 
Splunk at Airbus
Splunk at AirbusSplunk at Airbus
Splunk at Airbus
 
Cisa domain 3
Cisa domain 3Cisa domain 3
Cisa domain 3
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
802.1x
802.1x802.1x
802.1x
 
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxSWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptx
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 

Destaque

FedRAMP CSP SSP Training
FedRAMP CSP SSP TrainingFedRAMP CSP SSP Training
FedRAMP CSP SSP Training1ECG
 
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)James W. De Rienzo
 
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...James W. De Rienzo
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesTuan Phan
 
Wave 1 Implementation Summary
Wave 1 Implementation SummaryWave 1 Implementation Summary
Wave 1 Implementation SummaryHafizul Alam
 
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - PanelFocus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - PanelAkamai Technologies
 
Conops v1.1 07162012_508
Conops v1.1 07162012_508Conops v1.1 07162012_508
Conops v1.1 07162012_508Tuan Phan
 
Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712Tuan Phan
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0Valdez Ladd MBA, CISSP, CISA,
 
Fed ramp agency_implementation_webinar
Fed ramp agency_implementation_webinarFed ramp agency_implementation_webinar
Fed ramp agency_implementation_webinarTuan Phan
 
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)James W. De Rienzo
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case NarrativesJhoy Pedreza
 
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...James W. De Rienzo
 
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...James W. De Rienzo
 
Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4James W. De Rienzo
 
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...James W. De Rienzo
 
E authentication template 050212
E authentication template 050212E authentication template 050212
E authentication template 050212GovCloud Network
 

Destaque (20)

FedRAMP CSP SSP Training
FedRAMP CSP SSP TrainingFedRAMP CSP SSP Training
FedRAMP CSP SSP Training
 
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
 
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
Wave 1 Implementation Summary
Wave 1 Implementation SummaryWave 1 Implementation Summary
Wave 1 Implementation Summary
 
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - PanelFocus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
 
A Closer Look on C&C Panels
A Closer Look on C&C PanelsA Closer Look on C&C Panels
A Closer Look on C&C Panels
 
Conops v1.1 07162012_508
Conops v1.1 07162012_508Conops v1.1 07162012_508
Conops v1.1 07162012_508
 
Azure gov march 15th
Azure gov march 15thAzure gov march 15th
Azure gov march 15th
 
Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
 
Fed ramp agency_implementation_webinar
Fed ramp agency_implementation_webinarFed ramp agency_implementation_webinar
Fed ramp agency_implementation_webinar
 
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case Narratives
 
Acitivity diagram
Acitivity diagramAcitivity diagram
Acitivity diagram
 
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
 
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
 
Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4
 
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
 
E authentication template 050212
E authentication template 050212E authentication template 050212
E authentication template 050212
 

Semelhante a FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fedramp Baseline Controls

"How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko "How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko Fwdays
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsLiz Warner
 
Instrument Calibration Management System
Instrument Calibration Management SystemInstrument Calibration Management System
Instrument Calibration Management SystemSatish Nande
 
Oracle Ebiz R12.2 Features -- Ravi Sagaram
Oracle Ebiz R12.2 Features -- Ravi SagaramOracle Ebiz R12.2 Features -- Ravi Sagaram
Oracle Ebiz R12.2 Features -- Ravi Sagaramravisagaram
 
EPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC ConfigurationEPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC ConfigurationMustafa Golam
 
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009Accenture
 
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...Aruba, a Hewlett Packard Enterprise company
 
Avanceon Plant PAx Process
Avanceon Plant PAx Process Avanceon Plant PAx Process
Avanceon Plant PAx Process Avanceon MEA
 
Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02BhaveshShukla15
 
Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02BhaveshShukla15
 
Tying Automation to the Line of Business
Tying Automation to the Line of BusinessTying Automation to the Line of Business
Tying Automation to the Line of BusinessCA | Automic Software
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Liz Warner
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
 
PPT of SCADA DMS by CESU PED PURI
PPT of SCADA DMS by CESU PED PURIPPT of SCADA DMS by CESU PED PURI
PPT of SCADA DMS by CESU PED PURISrinibasha Das
 
Real time monitoring proposal 2011
Real time monitoring proposal 2011Real time monitoring proposal 2011
Real time monitoring proposal 2011Eduardo Carvajal
 
Risk Presentation (2)
Risk Presentation (2)Risk Presentation (2)
Risk Presentation (2)Kathy_67
 
M6 BLACKBELT PROJECT Rev 6.4
M6 BLACKBELT PROJECT Rev 6.4M6 BLACKBELT PROJECT Rev 6.4
M6 BLACKBELT PROJECT Rev 6.4Neelesh Bhagwat
 

Semelhante a FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fedramp Baseline Controls (20)

"How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko "How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Instrument Calibration Management System
Instrument Calibration Management SystemInstrument Calibration Management System
Instrument Calibration Management System
 
Oracle Ebiz R12.2 Features -- Ravi Sagaram
Oracle Ebiz R12.2 Features -- Ravi SagaramOracle Ebiz R12.2 Features -- Ravi Sagaram
Oracle Ebiz R12.2 Features -- Ravi Sagaram
 
Adapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear passAdapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear pass
 
EPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC ConfigurationEPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC Configuration
 
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
 
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
 
Avanceon Plant PAx Process
Avanceon Plant PAx Process Avanceon Plant PAx Process
Avanceon Plant PAx Process
 
Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02
 
Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02Apac 2015 minimizing integrity failure r02
Apac 2015 minimizing integrity failure r02
 
Tying Automation to the Line of Business
Tying Automation to the Line of BusinessTying Automation to the Line of Business
Tying Automation to the Line of Business
 
PlantPAx Process
PlantPAx ProcessPlantPAx Process
PlantPAx Process
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 
PPT of SCADA DMS by CESU PED PURI
PPT of SCADA DMS by CESU PED PURIPPT of SCADA DMS by CESU PED PURI
PPT of SCADA DMS by CESU PED PURI
 
Real time monitoring proposal 2011
Real time monitoring proposal 2011Real time monitoring proposal 2011
Real time monitoring proposal 2011
 
Risk Presentation (2)
Risk Presentation (2)Risk Presentation (2)
Risk Presentation (2)
 
M6 BLACKBELT PROJECT Rev 6.4
M6 BLACKBELT PROJECT Rev 6.4M6 BLACKBELT PROJECT Rev 6.4
M6 BLACKBELT PROJECT Rev 6.4
 

Mais de James W. De Rienzo

Nist sp 800_r5_baselines_&amp;_attributes
Nist sp 800_r5_baselines_&amp;_attributesNist sp 800_r5_baselines_&amp;_attributes
Nist sp 800_r5_baselines_&amp;_attributesJames W. De Rienzo
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417James W. De Rienzo
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJames W. De Rienzo
 
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...James W. De Rienzo
 
NIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database AnalysisNIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database AnalysisJames W. De Rienzo
 
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804James W. De Rienzo
 
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...James W. De Rienzo
 
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804James W. De Rienzo
 
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aCritical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aJames W. De Rienzo
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security FundamentalsJames W. De Rienzo
 
Information Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual FrameworkInformation Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual FrameworkJames W. De Rienzo
 
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)James W. De Rienzo
 
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...James W. De Rienzo
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application VirtualizationJames W. De Rienzo
 

Mais de James W. De Rienzo (18)

Nist sp 800_r5_baselines_&amp;_attributes
Nist sp 800_r5_baselines_&amp;_attributesNist sp 800_r5_baselines_&amp;_attributes
Nist sp 800_r5_baselines_&amp;_attributes
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
 
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
 
NIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database AnalysisNIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database Analysis
 
SEI CERT Podcast Series
SEI CERT Podcast SeriesSEI CERT Podcast Series
SEI CERT Podcast Series
 
CNDSP Assessment Template
CNDSP Assessment TemplateCNDSP Assessment Template
CNDSP Assessment Template
 
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
 
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
 
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
 
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aCritical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Information Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual FrameworkInformation Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual Framework
 
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 

Último

Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Christina Parmionova
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...SUHANI PANDEY
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...tanu pandey
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)Congressional Budget Office
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...tanu pandey
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 

Último (20)

Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 

FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fedramp Baseline Controls

  • 1. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 1 of 66 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A AC-1 Access Control Policy and Procedures X X AC-1.b.1 [at least every 3 years] AC-1.b.2 [at least annually] AC-2 Account Management X X AC-2j [at least annually] AC-2 (1) Account Management | Automated System Account Management X AC-2 (2) Account Management | Removal of Temporary / Emergency Accounts X [No more than 30 days for temporary and emergency account types] AC-2 (3) Account Management | Disable Inactive Accounts X [90 days for user accounts] Requirement: The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the Authorizing Official. AC-2 (4) Account Management | Automated Audit Actions X AC-2 (5) Account Management | Inactivity Logout X AC-2 (7) Account Management | Role- Based Schemes X AC-2 (9) Account Management | Restrictions on Use of Shared Groups / Accounts X Required if shared/group accounts are deployed AC-2 (10) Account Management | Shared / Group Account Credential Termination X Required if shared/group accounts are deployed AC-2 (12) Account Management | Account Monitoring / Atypical Usage X AC-2 (12)(a) and AC-2 (12)(b) Additional FedRAMP Requirements and Guidance: Required for privileged accounts. AC-3 Access Enforcement X X AC-4 Information Flow Enforcement X
  • 2. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 2 of 66 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A B C D Base Control ID Control Title Low Mod AC-1 Access Control Policy and Procedures X X AC-2 Account Management X X AC-2 (1) Account Management | Automated System Account Management X AC-2 (2) Account Management | Removal of Temporary / Emergency Accounts X AC-2 (3) Account Management | Disable Inactive Accounts X AC-2 (4) Account Management | Automated Audit Actions X AC-2 (5) Account Management | Inactivity Logout X AC-2 (7) Account Management | Role- Based Schemes X AC-2 (9) Account Management | Restrictions on Use of Shared Groups / Accounts X AC-2 (10) Account Management | Shared / Group Account Credential Termination X AC-2 (12) Account Management | Account Monitoring / Atypical Usage X AC-3 Access Enforcement X X AC-4 Information Flow Enforcement X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 3. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 3 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 17 18 19 20 21 22 23 24 25 AC-4 (21) Information Flow Enforcement | Physical / Logical Separation of Information Flows X AC-5 Separation of Duties X AC-6 Least Privilege X AC-6 (1) Least Privilege | Authorize Access to Security Functions X AC-6 (2) Least Privilege | Non-Privileged Access For No security Functions X [all security functions] AC-6 (2). Guidance: Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions. AC-6 (5) Least Privilege | Privileged Accounts X AC-6 (9) Least Privilege | Auditing Use of Privileged Functions X AC-6 (10) Least Privilege | Prohibit Non- privileged Users from Executing Privileged Functions X AC-7 Unsuccessful Logon Attempts X X AC-7a [not more than three] [fifteen minutes] AC-7b [locks the account/node for thirty minutes]
  • 4. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 4 of 66 2 3 A B C D Base Control ID Control Title Low Mod 17 18 19 20 21 22 23 24 25 AC-4 (21) Information Flow Enforcement | Physical / Logical Separation of Information Flows X AC-5 Separation of Duties X AC-6 Least Privilege X AC-6 (1) Least Privilege | Authorize Access to Security Functions X AC-6 (2) Least Privilege | Non-Privileged Access For No security Functions X AC-6 (5) Least Privilege | Privileged Accounts X AC-6 (9) Least Privilege | Auditing Use of Privileged Functions X AC-6 (10) Least Privilege | Prohibit Non- privileged Users from Executing Privileged Functions X AC-7 Unsuccessful Logon Attempts X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 5. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 5 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 26 27 28 29 30 31 AC-8 System Use Notification X X Parameter: See Additional Requirements and Guidance. Requirement: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the Authorizing Official (AO). Requirement: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the AO. Guidance: If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided. Requirement: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the AO. AC-10 Concurrent Session Control X [three (3) sessions for privileged access and two (2) sessions for non-privileged access] AC-11 Session Lock X AC-11a. [fifteen minutes] AC-11 (1) Session Lock | Pattern-Hiding Displays X AC-12 Session Termination X AC-14 Permitted Actions Without Identification or Authentication X X
  • 6. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 6 of 66 2 3 A B C D Base Control ID Control Title Low Mod 26 27 28 29 30 31 AC-8 System Use Notification X X AC-10 Concurrent Session Control X AC-11 Session Lock X AC-11 (1) Session Lock | Pattern-Hiding Displays X AC-12 Session Termination X AC-14 Permitted Actions Without Identification or Authentication X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 7. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 7 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 AC-17 Remote Access X X AC-17 (1) Remote Access | Automated Monitoring / Control X AC-17 (2) Remote Access | Protection of Confidentiality / Integrity Using Encryption X AC-17 (3) Remote Access | Managed Access Control Points X AC-17 (4) Remote Access | Privileged Commands / Access X AC-17 (9) Remote Access | Disconnect / Disable Access X [no greater than 15 minutes] AC-18 Wireless Access X X AC-18 (1) Wireless Access | Authentication and Encryption X AC-19 Access Control For Mobile Devices X X AC-19 (5) Access Control For Mobile Devices | Full Device / Container-Based Encryption X AC-20 Use of External Information Systems X X AC-20 (1) Use of External Information Systems | Limits on Authorized Use X AC-20 (2) Use of External Information Systems | Portable Storage Devices X AC-21 Information Sharing X AC-22 Publicly Accessible Content X X AC-22d. [at least quarterly] AT-1 Security Awareness and Training Policy and Procedures X X AT-1.b.1 [at least every 3 years] AT-1.b.2 [at least annually]
  • 8. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 8 of 66 2 3 A B C D Base Control ID Control Title Low Mod 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 AC-17 Remote Access X X AC-17 (1) Remote Access | Automated Monitoring / Control X AC-17 (2) Remote Access | Protection of Confidentiality / Integrity Using Encryption X AC-17 (3) Remote Access | Managed Access Control Points X AC-17 (4) Remote Access | Privileged Commands / Access X AC-17 (9) Remote Access | Disconnect / Disable Access X AC-18 Wireless Access X X AC-18 (1) Wireless Access | Authentication and Encryption X AC-19 Access Control For Mobile Devices X X AC-19 (5) Access Control For Mobile Devices | Full Device / Container-Based Encryption X AC-20 Use of External Information Systems X X AC-20 (1) Use of External Information Systems | Limits on Authorized Use X AC-20 (2) Use of External Information Systems | Portable Storage Devices X AC-21 Information Sharing X AC-22 Publicly Accessible Content X X AT-1 Security Awareness and Training Policy and Procedures X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 9. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 9 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 48 49 50 51 52 53 54 55 AT-2 Security Awareness Training X X AT-2. [Assignment: organization-defined frequency] Parameter: [at least annually] AT-2 (2) Security Awareness | Insider Threat X AT-3 Role-Based Security Training X X AT-3c. [Assignment: organization-defined frequency] Parameter: [at least annually] AT-4 Security Training Records X X AT-4b. [Assignment: organization-defined frequency] Parameter: [At least one years] AU-1 Audit and Accountability Policy and Procedures X X AU-1.b.1 [at least every 3 years] AU-1.b.2 [at least annually] AU-2 Audit Events X X AU-2a. [Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes]; AU-2d. [organization-defined subset of the auditable events defined in AU-2 a. to be audited continually for each identified event]. AU-2 (3) Audit Events | Reviews and Updates X AU-2 (3). [Assignment: organization-defined frequency] Parameter: [annually or whenever there is a change in the threat environment] Guidance: Annually or whenever changes in the threat environment are communicated to the service provider by the Authorizing Official. AU-3 Content of Audit Records X X
  • 10. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 10 of 66 2 3 A B C D Base Control ID Control Title Low Mod 48 49 50 51 52 53 54 55 AT-2 Security Awareness Training X X AT-2 (2) Security Awareness | Insider Threat X AT-3 Role-Based Security Training X X AT-4 Security Training Records X X AU-1 Audit and Accountability Policy and Procedures X X AU-2 Audit Events X X AU-2 (3) Audit Events | Reviews and Updates X AU-3 Content of Audit Records X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 11. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 11 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 56 57 58 59 60 61 62 63 64 AU-3 (1) Content of Audit Records | Additional Audit Information X AU-3 (1). [Assignment: organization-defined additional, more detailed information] Parameter: [session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon] AU-3 (1). Requirement: The service provider defines audit record types. The audit record types are approved and accepted by the Authorizing Official. Guidance: For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry. AU-4 Audit Storage Capacity X X AU-5 Response to Audit Processing Failures X X AU-5b. [Assignment: Organization-defined actions to be taken] Parameter: [low-impact: overwrite oldest audit records; moderate-impact: shut down] AU-6 Audit Review, Analysis, and Reporting X X AU-6a. [Assignment: organization-defined frequency] Parameter: [at least weekly] AU-6 (1) Audit Review, Analysis, and Reporting | Process Integration X AU-6 (3) Audit Review, Analysis, and Reporting | Correlate Audit Repositories X AU-7 Audit Reduction and Report Generation X AU-7 (1) Audit Reduction and Report Generation | Automatic Processing X AU-8 Time Stamps X X
  • 12. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 12 of 66 2 3 A B C D Base Control ID Control Title Low Mod 56 57 58 59 60 61 62 63 64 AU-3 (1) Content of Audit Records | Additional Audit Information X AU-4 Audit Storage Capacity X X AU-5 Response to Audit Processing Failures X X AU-6 Audit Review, Analysis, and Reporting X X AU-6 (1) Audit Review, Analysis, and Reporting | Process Integration X AU-6 (3) Audit Review, Analysis, and Reporting | Correlate Audit Repositories X AU-7 Audit Reduction and Report Generation X AU-7 (1) Audit Reduction and Report Generation | Automatic Processing X AU-8 Time Stamps X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 13. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 13 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 65 66 67 68 69 70 71 AU-8 (1) Time Stamps | Synchronization With Authoritative Time Source X AU-8 (1). [http://tf.nist.gov/tf-cgi/servers.cgi] <At least hourly> AU-8 (1). Requirement: The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server. Requirement: The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server. Guidance: Synchronization of system clocks improves the accuracy of log analysis. AU-9 Protection of Audit Information X X AU-9 (2) Protection of Audit Information | Audit Backup on Separate Physical Systems / Components X AU-9 (2). [at least weekly] AU-9 (4) Protection of Audit Information | Access by Subset of Privileged Users X AU-11 Audit Record Retention X X AU-11. [at least ninety days] AU-11. Requirement: The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements. AU-12 Audit Generation X X AU-12a. [all information system and network components where audit capability is deployed/available] CA-1 Security Assessment and Authorization Policies and Procedures X X CA-1.b.1 [at least every 3 years] CA-1.b.2 [at least annually]
  • 14. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 14 of 66 2 3 A B C D Base Control ID Control Title Low Mod 65 66 67 68 69 70 71 AU-8 (1) Time Stamps | Synchronization With Authoritative Time Source X AU-9 Protection of Audit Information X X AU-9 (2) Protection of Audit Information | Audit Backup on Separate Physical Systems / Components X AU-9 (4) Protection of Audit Information | Access by Subset of Privileged Users X AU-11 Audit Record Retention X X AU-12 Audit Generation X X CA-1 Security Assessment and Authorization Policies and Procedures X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 15. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 15 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 72 73 74 75 76 77 78 79 80 CA-2 Security Assessments X X CA-2b. [at least annually] CA-2d[individuals or roles to include FedRAMP PMO] CA-2 (1) Security Assessments | Independent Assessors X X Added to NIST Baseline for "Low" FedRAMP baseline. For JAB Authorization, must be an accredited 3PAO CA-2 (2) Security Assessments | Specialized Assessments X [at least annually] Requirement: To include 'announced', 'vulnerability scanning' CA-2 (3) Security Assessments | External Organizations X [Any FedRAMP Accredited 3PAO] [the conditions of a P-ATO in the FedRAMP Repository] CA-3 System Interconnections X X CA-3c. 3 Years / Annually and on input from FedRAMP CA-3 (3) System Interconnections | Unclassified Non-National Security System Connections X Boundary Protections which meet the Trusted Internet Connection (TIC) requirements CA-3(3) Guidance: Refer to Appendix H – Cloud Considerations of the TIC 2.0 Reference Architecture document. CA-3 (5) System Interconnections | Restrictions on External Network Connections X For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing CA-5 Plan of Action and Milestones X X CA-5b. [at least monthly] CA-5 Guidance: Requirement: POA&Ms must be provided at least monthly. CA-6 Security Authorization X X CA-6c. [at least every three years or when a significant change occurs] CA-6c. Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the Authorizing Official.
  • 16. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 16 of 66 2 3 A B C D Base Control ID Control Title Low Mod 72 73 74 75 76 77 78 79 80 CA-2 Security Assessments X X CA-2 (1) Security Assessments | Independent Assessors X X CA-2 (2) Security Assessments | Specialized Assessments X CA-2 (3) Security Assessments | External Organizations X CA-3 System Interconnections X X CA-3 (3) System Interconnections | Unclassified Non-National Security System Connections X CA-3 (5) System Interconnections | Restrictions on External Network Connections X CA-5 Plan of Action and Milestones X X CA-6 Security Authorization X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 17. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 17 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 81 82 83 84 85 86 87 88 89 90 91 CA-7 Continuous Monitoring X X CA-7d. [To meet Federal and FedRAMP requirements] Operating System Scans: at least monthly Database and Web Application Scans: at least monthly All scans performed by Independent Assessor: at least annually CA-7 Guidance: CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates. CA-7 (1) Continuous Monitoring | Independent Assessment X CA-8 Penetration Testing X [at least annually] CA-8 (1) Penetration Testing | Independent Penetration Agent or Team X CA-9 Internal System Connections X X CM-1 Configuration Management Policy and Procedures X X CM-1.b.1 [at least every 3 years] CM-1.b.2 [at least annually] CM-2 Baseline Configuration X X CM-2 (1) Baseline Configuration | Reviews and Updates X CM-2 (1) (a). [at least annually] CM-2 (1) (b). [to include when directed by Authorizing Official] CM-2 (2) Baseline Configuration | Automation Support For Accuracy / Currency X CM-2 (3) Baseline Configuration | Retention of Previous Configurations X CM-2 (7) Baseline Configuration | Configure Systems, Components, or Devices for High-Risk Areas X
  • 18. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 18 of 66 2 3 A B C D Base Control ID Control Title Low Mod 81 82 83 84 85 86 87 88 89 90 91 CA-7 Continuous Monitoring X X CA-7 (1) Continuous Monitoring | Independent Assessment X CA-8 Penetration Testing X CA-8 (1) Penetration Testing | Independent Penetration Agent or Team X CA-9 Internal System Connections X X CM-1 Configuration Management Policy and Procedures X X CM-2 Baseline Configuration X X CM-2 (1) Baseline Configuration | Reviews and Updates X CM-2 (2) Baseline Configuration | Automation Support For Accuracy / Currency X CM-2 (3) Baseline Configuration | Retention of Previous Configurations X CM-2 (7) Baseline Configuration | Configure Systems, Components, or Devices for High-Risk Areas X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 19. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 19 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 92 93 94 95 96 97 CM-3 Configuration Change Control X Requirement: The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the Authorizing Official. CM-3e Guidance: In accordance with record retention policies and procedures. CM-4 Security Impact Analysis X X CM-5 Access Restrictions For Change X CM-5 (1) Access Restrictions For Change | Automated Access Enforcement / Auditing X CM-5 (3) Access Restrictions For Change | Signed Components X Guidance: If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be utilized. CM-5 (5) Access Restrictions For Change | Limit Production / Operational Privileges X CM-5 (5) (b). [at least quarterly]
  • 20. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 20 of 66 2 3 A B C D Base Control ID Control Title Low Mod 92 93 94 95 96 97 CM-3 Configuration Change Control X CM-4 Security Impact Analysis X X CM-5 Access Restrictions For Change X CM-5 (1) Access Restrictions For Change | Automated Access Enforcement / Auditing X CM-5 (3) Access Restrictions For Change | Signed Components X CM-5 (5) Access Restrictions For Change | Limit Production / Operational Privileges X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 21. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 21 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 98 99 100 101 CM-6 Configuration Settings X X CM-6a. [See CM-6(a) Additional FedRAMP Requirements and Guidance] CM-6a. Requirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available. CM-6a. Requirement: The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available). CM-6a. Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_ usgcbfdcc . CM-6 (1) Configuration Settings | Automated Central Management / Application / Verification X CM-7 Least Functionality X X CM-7. [United States Government Configuration Baseline (USGCB)] Requirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available. CM-7. Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_ usgcbfdcc. (Partially derived from AC-17(8).) CM-7 (1) Least Functionality | Periodic Review X CM-7(1) [ At least Monthly]
  • 22. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 22 of 66 2 3 A B C D Base Control ID Control Title Low Mod 98 99 100 101 CM-6 Configuration Settings X X CM-6 (1) Configuration Settings | Automated Central Management / Application / Verification X CM-7 Least Functionality X X CM-7 (1) Least Functionality | Periodic Review X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 23. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 23 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 102 103 104 105 106 107 108 109 110 111 112 113 CM-7 (2) Least Functionality | Prevent Program Execution X CM-7(2) Guidance: This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run. CM-7 (5) Least Functionality | Authorized Software / Whitelisting X CM-7(5)[ at least Annually or when there is a change.] CM-8 Information System Component Inventory X X CM-8b. [at least monthly] CM-8 Requirement: must be provided at least monthly or when there is a change. CM-8 (1) Information System Component Inventory | Updates During Installations / Removals X CM-8 (2) #N/A #N/A #N/A #N/A This is a FedRAMP High Control. Does not belong here. CM-8 (3) Information System Component Inventory | Automated Unauthorized Component Detection X CM-8 (3) (a). [Continuously, using automated mechanisms with a maximum five-minute delay in detection.] CM-8 (5) Information System Component Inventory | No Duplicate Accounting of Components X CM-9 Configuration Management Plan X CM-10 Software Usage Restrictions X X CM-10 (1) Software Usage Restrictions | Open Source Software X CM-11 User-Installed Software X X CM-11.c. [Continuously (via CM-7 (5))] CP-1 Contingency Planning Policy and Procedures X X CP-1.b.1 [at least every 3 years] CP-1.b.2 [at least annually]
  • 24. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 24 of 66 2 3 A B C D Base Control ID Control Title Low Mod 102 103 104 105 106 107 108 109 110 111 112 113 CM-7 (2) Least Functionality | Prevent Program Execution X CM-7 (5) Least Functionality | Authorized Software / Whitelisting X CM-8 Information System Component Inventory X X CM-8 (1) Information System Component Inventory | Updates During Installations / Removals X CM-8 (2) #N/A #N/A #N/A CM-8 (3) Information System Component Inventory | Automated Unauthorized Component Detection X CM-8 (5) Information System Component Inventory | No Duplicate Accounting of Components X CM-9 Configuration Management Plan X CM-10 Software Usage Restrictions X X CM-10 (1) Software Usage Restrictions | Open Source Software X CM-11 User-Installed Software X X CP-1 Contingency Planning Policy and Procedures X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 25. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 25 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 114 115 116 117 118 119 120 121 122 123 124 125 CP-2 Contingency Plan X X CP-2d. [at least annually] Requirement: For JAB authorizations the contingency lists include designated FedRAMP personnel. CP-2 (1) Contingency Plan | Coordinate With Related Plans X CP-2 (2) Contingency Plan | Capacity Planning X CP-2 (3) Contingency Plan | Resume Essential Missions / Business Functions X CP-2 (8) Contingency Plan | Identify Critical Assets X CP-3 Contingency Training X X CP-3.a. [ 10 days] CP-3.c. [at least annually] CP-4 Contingency Plan Testing X X CP-4a. [at least annually for moderate impact systems; at least every three years for low impact systems] [functional exercises for moderate impact systems; classroom exercises/table top written tests for low impact systems] CP-4a. Requirement: The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the Authorizing Official prior to initiating testing. CP-4 (1) Contingency Plan Testing | Coordinate With Related Plans X CP-6 Alternate Storage Site X CP-6 (1) Alternate Storage Site | Separation From Primary Site X CP-6 (3) Alternate Storage Site | Accessibility X CP-7 Alternate Processing Site X CP-7a. Requirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
  • 26. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 26 of 66 2 3 A B C D Base Control ID Control Title Low Mod 114 115 116 117 118 119 120 121 122 123 124 125 CP-2 Contingency Plan X X CP-2 (1) Contingency Plan | Coordinate With Related Plans X CP-2 (2) Contingency Plan | Capacity Planning X CP-2 (3) Contingency Plan | Resume Essential Missions / Business Functions X CP-2 (8) Contingency Plan | Identify Critical Assets X CP-3 Contingency Training X X CP-4 Contingency Plan Testing X X CP-4 (1) Contingency Plan Testing | Coordinate With Related Plans X CP-6 Alternate Storage Site X CP-6 (1) Alternate Storage Site | Separation From Primary Site X CP-6 (3) Alternate Storage Site | Accessibility X CP-7 Alternate Processing Site X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 27. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 27 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 126 127 128 129 130 CP-7 (1) Alternate Processing Site | Separation From Primary Site X CP-7(1) Guidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant. CP-7 (2) Alternate Processing Site | Accessibility X CP-7 (3) Alternate Processing Site | Priority of Service X CP-8 Telecommunications Services X CP-8. Requirement: The service provider defines a time period consistent with the business impact analysis. CP-8 (1) Telecommunications Services | Priority of Service Provisions X
  • 28. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 28 of 66 2 3 A B C D Base Control ID Control Title Low Mod 126 127 128 129 130 CP-7 (1) Alternate Processing Site | Separation From Primary Site X CP-7 (2) Alternate Processing Site | Accessibility X CP-7 (3) Alternate Processing Site | Priority of Service X CP-8 Telecommunications Services X CP-8 (1) Telecommunications Services | Priority of Service Provisions X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 29. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 29 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 131 132 133 134 CP-9 Information System Backup X X CP-9a. [daily incremental; weekly full] CP-9b. [daily incremental; weekly full] CP-9c. [daily incremental; weekly full] CP-9. Requirement: The service provider shall determine what elements of the cloud environment require the Information System Backup control. Requirement: The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check. CP-9a. Requirement: The service provider maintains at least three backup copies of user- level information (at least one of which is available online) or provides an equivalent alternative. CP-9b. Requirement: The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative. CP-9c. Requirement: The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative. CP-9 (1) Information System Backup | Testing For Reliability / Integrity X CP-9 (1). [at least annually] CP-9 (3) Information System Backup | Separate Storage for Critical Information X CP-10 Information System Recovery and Reconstitution X X
  • 30. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 30 of 66 2 3 A B C D Base Control ID Control Title Low Mod 131 132 133 134 CP-9 Information System Backup X X CP-9 (1) Information System Backup | Testing For Reliability / Integrity X CP-9 (3) Information System Backup | Separate Storage for Critical Information X CP-10 Information System Recovery and Reconstitution X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 31. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 31 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 135 136 137 138 139 140 141 142 CP-10 (2) Information System Recovery and Reconstitution | Transaction Recovery X IA-1 Identification and Authentication Policy and Procedures X X IA-1.b.1 [at least every 3 years] IA-1.b.2 [at least annually] IA-2 Identification and Authentication (Organizational Users) X X IA-2 (1) Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts X X IA-2 (2) Identification and Authentication (Organizational Users) | Network Access to Non- Privileged Accounts X IA-2 (3) Identification and Authentication (Organizational Users) | Local Access to Privileged Accounts X IA-2 (5) Identification and Authentication (Organizational Users) | Group Authentication X IA-2 (8) Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts - Replay Resistant X
  • 32. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 32 of 66 2 3 A B C D Base Control ID Control Title Low Mod 135 136 137 138 139 140 141 142 CP-10 (2) Information System Recovery and Reconstitution | Transaction Recovery X IA-1 Identification and Authentication Policy and Procedures X X IA-2 Identification and Authentication (Organizational Users) X X IA-2 (1) Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts X X IA-2 (2) Identification and Authentication (Organizational Users) | Network Access to Non- Privileged Accounts X IA-2 (3) Identification and Authentication (Organizational Users) | Local Access to Privileged Accounts X IA-2 (5) Identification and Authentication (Organizational Users) | Group Authentication X IA-2 (8) Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts - Replay Resistant X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 33. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 33 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 143 144 145 146 147 148 149 150 151 IA-2 (11) Identification and Authentication (Organizational Users) | Remote Access - Separate Device X The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements]. IA-2 (12) Identification and Authentication (Organizational Users) | Acceptance of PIV Credentials X X Guidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12. IA-3 Device Identification and Authentication X IA-4 Identifier Management X X IA-4d. [at least two years] IA-4e. [ninety days for user identifiers] (See additional requirements and guidance.) IA-4e. Requirement: The service provider defines time period of inactivity for device identifiers. IA-4 (4) Identifier Management | Identify User Status X IA-4 (4). [contractors; foreign nationals] IA-5 Authenticator Management X X IA-5g. [to include sixty days for passwords] IA-5 (1) Authenticator Management | Password-Based Authentication X X IA-5 (1) (a). [case sensitive, minimum of twelve characters, and at least one each of upper-case letters, lower-case letters, numbers, and special characters] IA-5 (1) (b). [at least one] IA-5 (1) (d). [one day minimum, sixty day maximum] IA-5 (1) (e). [twenty four] IA-5 (2) Authenticator Management | PKI-Based Authentication X IA-5 (3) Authenticator Management | In- Person or Trusted Third-Party Registration X IA-5 (3). [All hardware/biometric (multifactor authenticators] [in person]
  • 34. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 34 of 66 2 3 A B C D Base Control ID Control Title Low Mod 143 144 145 146 147 148 149 150 151 IA-2 (11) Identification and Authentication (Organizational Users) | Remote Access - Separate Device X IA-2 (12) Identification and Authentication (Organizational Users) | Acceptance of PIV Credentials X X IA-3 Device Identification and Authentication X IA-4 Identifier Management X X IA-4 (4) Identifier Management | Identify User Status X IA-5 Authenticator Management X X IA-5 (1) Authenticator Management | Password-Based Authentication X X IA-5 (2) Authenticator Management | PKI-Based Authentication X IA-5 (3) Authenticator Management | In- Person or Trusted Third-Party Registration X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 35. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 35 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 152 153 154 155 156 157 158 159 160 IA-5 (4) Authenticator Management | Automated Support for Password Strength Determination X IA-4e Additional FedRAMP Requirements and Guidance: Guidance: If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators IA-5 (6) Authenticator Management | Protection of Authenticators X IA-5 (7) Authenticator Management | No Embedded Unencrypted Static Authenticators X IA-5 (11) Authenticator Management | Hardware Token-Based Authentication X X IA-6 Authenticator Feedback X X IA-7 Cryptographic Module Authentication X X IA-8 Identification and Authentication (Non-Organizational Users) X X IA-8 (1) Identification and Authentication (Non-Organizational Users) | Acceptance of PIV Credentials from Other Agencies X X IA-8 (2) Identification and Authentication (Non-Organizational Users) | Acceptance of Third-Party Credentials X X
  • 36. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 36 of 66 2 3 A B C D Base Control ID Control Title Low Mod 152 153 154 155 156 157 158 159 160 IA-5 (4) Authenticator Management | Automated Support for Password Strength Determination X IA-5 (6) Authenticator Management | Protection of Authenticators X IA-5 (7) Authenticator Management | No Embedded Unencrypted Static Authenticators X IA-5 (11) Authenticator Management | Hardware Token-Based Authentication X X IA-6 Authenticator Feedback X X IA-7 Cryptographic Module Authentication X X IA-8 Identification and Authentication (Non-Organizational Users) X X IA-8 (1) Identification and Authentication (Non-Organizational Users) | Acceptance of PIV Credentials from Other Agencies X X IA-8 (2) Identification and Authentication (Non-Organizational Users) | Acceptance of Third-Party Credentials X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 37. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 37 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 161 162 163 164 165 166 167 168 IA-8 (3) Identification and Authentication (Non-Organizational Users) | Use of FICAM-Approved Products X X IA-8 (4) Identification and Authentication (Non-Organizational Users) | Use of FICAM-Issued Profiles X X IR-1 Incident Response Policy and Procedures X X IR-1.b.1 [at least every 3 years] IR-1.b.2 [at least annually] IR-2 Incident Response Training X X IR-2b. [at least annually] IR-3 Incident Response Testing X IR-3. [at least annually] IR-3. Requirement: The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). Requirement: For JAB Authorization, the service provider provides test plans to the Authorizing Official (AO) annually. Requirement: Test plans are approved and accepted by the Authorizing Official prior to test commencing. IR-3 (2) Incident Response Testing | Coordination With Related Plans X IR-4 Incident Handling X X IR-4/A13. Requirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system. IR-4 (1) Incident Handling | Automated Incident Handling Processes X
  • 38. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 38 of 66 2 3 A B C D Base Control ID Control Title Low Mod 161 162 163 164 165 166 167 168 IA-8 (3) Identification and Authentication (Non-Organizational Users) | Use of FICAM-Approved Products X X IA-8 (4) Identification and Authentication (Non-Organizational Users) | Use of FICAM-Issued Profiles X X IR-1 Incident Response Policy and Procedures X X IR-2 Incident Response Training X X IR-3 Incident Response Testing X IR-3 (2) Incident Response Testing | Coordination With Related Plans X IR-4 Incident Handling X X IR-4 (1) Incident Handling | Automated Incident Handling Processes X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 39. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 39 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 169 170 171 172 173 174 175 176 177 178 179 IR-5 Incident Monitoring X X IR-6 Incident Reporting X X IR-6a. [US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)] Requirement: Reports security incident information according to FedRAMP Incident Communications Procedure. IR-6 (1) Incident Reporting | Automated Reporting X IR-7 Incident Response Assistance X X IR-7 (1) Incident Response Assistance | Automation Support For Availability of Information / Support X IR-7 (2) Incident Response Assistance | Coordination With External Providers X IR-8 Incident Response Plan X X IR-8c. [at least annually] IR-8(b) Additional FedRAMP Requirements and Guidance: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel. IR-8(e) Additional FedRAMP Requirements and Guidance: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel. IR-9 Information Spillage Response X IR-9 (1) Information Spillage Response | Responsible Personnel X IR-9 (2) Information Spillage Response | Training X IR-9 (3) Information Spillage Response | Post-Spill Operations X
  • 40. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 40 of 66 2 3 A B C D Base Control ID Control Title Low Mod 169 170 171 172 173 174 175 176 177 178 179 IR-5 Incident Monitoring X X IR-6 Incident Reporting X X IR-6 (1) Incident Reporting | Automated Reporting X IR-7 Incident Response Assistance X X IR-7 (1) Incident Response Assistance | Automation Support For Availability of Information / Support X IR-7 (2) Incident Response Assistance | Coordination With External Providers X IR-8 Incident Response Plan X X IR-9 Information Spillage Response X IR-9 (1) Information Spillage Response | Responsible Personnel X IR-9 (2) Information Spillage Response | Training X IR-9 (3) Information Spillage Response | Post-Spill Operations X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 41. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 41 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 IR-9 (4) Information Spillage Response | Exposure to Unauthorized Personnel X MA-1 System Maintenance Policy and Procedures X X MA-1.b.1 [at least every 3 years] MA-1.b.2 [at least annually] MA-2 Controlled Maintenance X X MA-3 Maintenance Tools X MA-3 (1) Maintenance Tools | Inspect Tools X MA-3 (2) Maintenance Tools | Inspect Media X MA-3 (3) Maintenance Tools | Prevent Unauthorized Removal X MA-3 (3) (d). [the information owner explicitly authorizing removal of the equipment from the facility] MA-4 Nonlocal Maintenance X X MA-4 (2) Nonlocal Maintenance | Document Nonlocal Maintenance X MA-5 Maintenance Personnel X X MA-5 (1) Maintenance Personnel | Individuals Without Appropriate Access X Requirement: Only MA-5 (1)(a)(1) is required by FedRAMP Moderate Baseline MA-6 Timely Maintenance X MP-1 Media Protection Policy and Procedures X X MP-1.b.1 [at least every 3 years] MP-1.b.2 [at least annually] MP-2 Media Access X X MP-3 Media Marking X MP-3b. [no removable media types] MP-3b. Guidance: Second parameter not- applicable MP-4 Media Storage X MP-4a. [all types of digital and non-digital media with sensitive information] within [FedRAMP Assignment: see additional FedRAMP requirements and guidance]; MP-4a Additional FedRAMP Requirements and Guidance: Requirement: The service provider defines controlled areas within facilities where the information and information system reside.
  • 42. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 42 of 66 2 3 A B C D Base Control ID Control Title Low Mod 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 IR-9 (4) Information Spillage Response | Exposure to Unauthorized Personnel X MA-1 System Maintenance Policy and Procedures X X MA-2 Controlled Maintenance X X MA-3 Maintenance Tools X MA-3 (1) Maintenance Tools | Inspect Tools X MA-3 (2) Maintenance Tools | Inspect Media X MA-3 (3) Maintenance Tools | Prevent Unauthorized Removal X MA-4 Nonlocal Maintenance X X MA-4 (2) Nonlocal Maintenance | Document Nonlocal Maintenance X MA-5 Maintenance Personnel X X MA-5 (1) Maintenance Personnel | Individuals Without Appropriate Access X MA-6 Timely Maintenance X MP-1 Media Protection Policy and Procedures X X MP-2 Media Access X X MP-3 Media Marking X MP-4 Media Storage X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 43. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 43 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 196 197 198 199 200 201 202 203 MP-5 Media Transport X MP-5a. [all media with sensitive information] [prior to leaving secure/controlled environment: for digital media, encryption using a FIPS 140-2 validated encryption module; for non-digital media, secured in locked container] MP-5 (4) Media Transport | Cryptographic Protection X MP-6 Media Sanitization X X The organization: a. Sanitizes [Assignment: organization-defined information system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures] in accordance with applicable federal and organizational standards and policies; and b. Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information. MP-6 (2) Media Sanitization | Equipment Testing X [At least annually] Guidance: Equipment and procedures may be tested or validated for effectiveness MP-7 Media Use X X MP-7 (1) Media Use | Prohibit Use without Owner X PE-1 Physical and Environmental Protection Policy and Procedures X X PE-1.b.1 [at least every 3 years] PE-1.b.2 [at least annually] PE-2 Physical Access Authorizations X X PE-2c. [at least annually]
  • 44. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 44 of 66 2 3 A B C D Base Control ID Control Title Low Mod 196 197 198 199 200 201 202 203 MP-5 Media Transport X MP-5 (4) Media Transport | Cryptographic Protection X MP-6 Media Sanitization X X MP-6 (2) Media Sanitization | Equipment Testing X MP-7 Media Use X X MP-7 (1) Media Use | Prohibit Use without Owner X PE-1 Physical and Environmental Protection Policy and Procedures X X PE-2 Physical Access Authorizations X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 45. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 45 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 204 205 206 207 208 209 210 211 212 213 214 215 216 PE-3 Physical Access Control X X PE-3a.2 [CSP defined physical access control systems/devices AND guards] PE-3d. [in all circumstances within restricted access area where the information system resides] PE-3f. [at least annually] PE-3g. [at least annually] PE-4 Access Control For Transmission Medium X PE-5 Access Control For Output Devices X PE-6 Monitoring Physical Access X X PE-6b.[at least monthly] PE-6 (1) Monitoring Physical Access | Intrusion Alarms / Surveillance Equipment X PE-8 Visitor Access Records X X PE-8a [for a minimum of one year] PE-8b. [at least monthly] PE-9 Power Equipment and Cabling X PE-10 Emergency Shutoff X PE-11 Emergency Power X PE-12 Emergency Lighting X X PE-13 Fire Protection X X PE-13 (2) Fire Protection | Suppression Devices / Systems X PE-13 (3) Fire Protection | Automatic Fire Suppression X
  • 46. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 46 of 66 2 3 A B C D Base Control ID Control Title Low Mod 204 205 206 207 208 209 210 211 212 213 214 215 216 PE-3 Physical Access Control X X PE-4 Access Control For Transmission Medium X PE-5 Access Control For Output Devices X PE-6 Monitoring Physical Access X X PE-6 (1) Monitoring Physical Access | Intrusion Alarms / Surveillance Equipment X PE-8 Visitor Access Records X X PE-9 Power Equipment and Cabling X PE-10 Emergency Shutoff X PE-11 Emergency Power X PE-12 Emergency Lighting X X PE-13 Fire Protection X X PE-13 (2) Fire Protection | Suppression Devices / Systems X PE-13 (3) Fire Protection | Automatic Fire Suppression X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 47. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 47 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 217 218 219 220 221 222 223 224 225 226 227 228 229 PE-14 Temperature and Humidity Controls X X PE-14a. [consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments] PE-14b. [continuously] PE-14a. Requirements: The service provider measures temperature at server inlets and humidity levels by dew point. PE-14 (2) Temperature and Humidity Controls | Monitoring With Alarms / Notifications X PE-15 Water Damage Protection X X PE-16 Delivery and Removal X X PE-16. [all information system components] PE-17 Alternate Work Site X PL-1 Security Planning Policy and Procedures X X PL-1.b.1 [at least every 3 years] PL-1.b.2 [at least annually] PL-2 System Security Plan X X PL-2c. [at least annually] PL-2 (3) System Security Plan | Plan / Coordinate With Other Organizational Entities X PL-4 Rules of Behavior X X PL-4c. [At least every 3 years] PL-4 (1) Rules of Behavior | Social Media and Networking Restrictions X PL-8 Information Security Architecture X PL-8b. [At least annually] PS-1 Personnel Security Policy and Procedures X X PS-1.b.1 [at least every 3 years] PS-1.b.2 [at least annually] PS-2 Position Risk Designation X X PS-2c. [at least every three years]
  • 48. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 48 of 66 2 3 A B C D Base Control ID Control Title Low Mod 217 218 219 220 221 222 223 224 225 226 227 228 229 PE-14 Temperature and Humidity Controls X X PE-14 (2) Temperature and Humidity Controls | Monitoring With Alarms / Notifications X PE-15 Water Damage Protection X X PE-16 Delivery and Removal X X PE-17 Alternate Work Site X PL-1 Security Planning Policy and Procedures X X PL-2 System Security Plan X X PL-2 (3) System Security Plan | Plan / Coordinate With Other Organizational Entities X PL-4 Rules of Behavior X X PL-4 (1) Rules of Behavior | Social Media and Networking Restrictions X PL-8 Information Security Architecture X PS-1 Personnel Security Policy and Procedures X X PS-2 Position Risk Designation X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 49. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 49 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 230 231 232 233 234 235 236 237 238 239 PS-3 Personnel Screening X X PS-3b. [for national security clearances; a reinvestigation is required during the 5th year for top secret security clearance, the 10th year for secret security clearance, and 15th year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the 5th year. There is no reinvestigation for other moderate risk positions or any low risk positions] PS-3 (3) Personnel Screening | Information With Special Protection Measures X PS-3 (3)(b). [personnel screening criteria – as required by specific information] PS-4 Personnel Termination X X PS-4.a. [same day] PS-5 Personnel Transfer X X PS-5. [within five days of the formal transfer action (DoD 24 hours)] PS-6 Access Agreements X X PS-6b. [at least annually] PS-6c.2. [at least annually] PS-7 Third-Party Personnel Security X X PS-7d. organization-defined time period – same day PS-8 Personnel Sanctions X X RA-1 Risk Assessment Policy and Procedures X X RA-1.b.1 [at least every 3 years] RA-1.b.2 [at least annually] RA-2 Security Categorization X X RA-3 Risk Assessment X X RA-3b. [security assessment report] RA-3c. [at least every three years or when a significant change occurs] RA-3e. [at least every three years or when a significant change occurs] Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. RA-3d. Requirement: to include the Authorizing Official; for JAB authorizations to include FedRAMP
  • 50. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 50 of 66 2 3 A B C D Base Control ID Control Title Low Mod 230 231 232 233 234 235 236 237 238 239 PS-3 Personnel Screening X X PS-3 (3) Personnel Screening | Information With Special Protection Measures X PS-4 Personnel Termination X X PS-5 Personnel Transfer X X PS-6 Access Agreements X X PS-7 Third-Party Personnel Security X X PS-8 Personnel Sanctions X X RA-1 Risk Assessment Policy and Procedures X X RA-2 Security Categorization X X RA-3 Risk Assessment X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 51. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 51 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 240 241 242 243 244 245 246 247 248 249 RA-5 Vulnerability Scanning X X RA-5a. [monthly operating system/infrastructure; monthly web applications and databases] RA-5d. [high-risk vulnerabilities mitigated within thirty days from date of discovery; moderate- risk vulnerabilities mitigated within ninety days from date of discovery] RA-5a. Requirement: an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually. RA-5e. Requirement: to include the Risk Executive; for JAB authorizations to include FedRAMP RA-5 (1) Vulnerability Scanning | Update Tool Capability X RA-5 (2) Vulnerability Scanning | Update by Frequency / Prior to New Scan / When Identified X RA-5 (2). [prior to a new scan] RA-5 (3) Vulnerability Scanning | Breadth / Depth of Coverage X RA-5 (5) Vulnerability Scanning | Privileged Access X RA-5 (5). [operating systems / web applications / databases] [all scans] RA-5 (6) Vulnerability Scanning | Automated Trend Analyses X RA-5(6) Guidance: include in Continuous Monitoring ISSO digest/report to Authorizing Official RA-5 (8) Vulnerability Scanning | Review Historic Audit Logs X RA-5 (8). Requirements: This enhancement is required for all high vulnerability scan findings. Guidance: While scanning tools may lable findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability. SA-1 System and Services Acquisition Policy and Procedures X X SA-1.b.1 [at least every 3 years] SA-1.b.2 [at least annually] SA-2 Allocation of Resources X X SA-3 System Development Life Cycle X X
  • 52. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 52 of 66 2 3 A B C D Base Control ID Control Title Low Mod 240 241 242 243 244 245 246 247 248 249 RA-5 Vulnerability Scanning X X RA-5 (1) Vulnerability Scanning | Update Tool Capability X RA-5 (2) Vulnerability Scanning | Update by Frequency / Prior to New Scan / When Identified X RA-5 (3) Vulnerability Scanning | Breadth / Depth of Coverage X RA-5 (5) Vulnerability Scanning | Privileged Access X RA-5 (6) Vulnerability Scanning | Automated Trend Analyses X RA-5 (8) Vulnerability Scanning | Review Historic Audit Logs X SA-1 System and Services Acquisition Policy and Procedures X X SA-2 Allocation of Resources X X SA-3 System Development Life Cycle X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 53. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 53 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 250 251 252 253 254 255 256 257 258 SA-4 Acquisition Process X X SA-4. Guidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred. See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.ht ml. SA-4 (1) Acquisition Process | Functional Properties of Security Controls X SA-4 (2) Acquisition Process | Design / Implementation Information for Security Controls X [to include security-relevant external system interfaces and high-level design] SA-4 (8) Acquisition Process | Continuous Monitoring Plan X SA-4 (8). [at least the minimum requirement as defined in control CA-7] SA-4 (8) Guidance: CSP must use the same security standards regardless of where the system component or information system service is aquired. SA-4 (9) Acquisition Process | Functions / Ports / Protocols / Services in Use X SA-4 (10) Acquisition Process | Use of Approved PIV Products X X SA-5 Information System Documentation X X SA-8 Security Engineering Principles X SA-9 External Information System Services X X SA-9a. [FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system] SA-9c. [Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored]
  • 54. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 54 of 66 2 3 A B C D Base Control ID Control Title Low Mod 250 251 252 253 254 255 256 257 258 SA-4 Acquisition Process X X SA-4 (1) Acquisition Process | Functional Properties of Security Controls X SA-4 (2) Acquisition Process | Design / Implementation Information for Security Controls X SA-4 (8) Acquisition Process | Continuous Monitoring Plan X SA-4 (9) Acquisition Process | Functions / Ports / Protocols / Services in Use X SA-4 (10) Acquisition Process | Use of Approved PIV Products X X SA-5 Information System Documentation X X SA-8 Security Engineering Principles X SA-9 External Information System Services X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 55. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 55 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 259 260 261 262 263 264 265 266 267 SA-9 (1) External Information Systems | Risk Assessments / Organizational Approvals X SA-9 (1) see Additional Requirement and Guidance SA-9 (1). Requirement: The service provider documents all existing outsourced security services and conducts a risk assessment of future outsourced security services. For JAB authorizations, future planned outsourced services are approved and accepted by the JAB. SA-9 (2) External Information Systems | Identification of Functions / Ports / Protocols / Services X SA-9 (2). [All external systems where Federal information is processed, transmitted or stored] SA-9 (4) External Information Systems | Consistent Interests of Consumers and Providers X SA-9 (4). [All external systems where Federal information is processed, transmitted or stored] SA-9 (5) External Information Systems | Processing, Storage, and Service Location X SA-9 (5). [information processing, transmission, information data, AND information services] SA-10 Developer Configuration Management X SA-10a. [development, implementation, AND operation] SA-10e. Requirement: for JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP. SA-10 (1) Developer Configuration Management | Software / Firmware Integrity Verification X SA-11 Developer Security Testing and Evaluation X SA-11 (1) Developer Security Testing and Evaluation | Static Code Analysis X Requirement: SA-11 (1) or SA-11 (8) or both Requirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed. SA-11 (2) Developer Security Testing and Evaluation | Threat and Vulnerability Analyses X
  • 56. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 56 of 66 2 3 A B C D Base Control ID Control Title Low Mod 259 260 261 262 263 264 265 266 267 SA-9 (1) External Information Systems | Risk Assessments / Organizational Approvals X SA-9 (2) External Information Systems | Identification of Functions / Ports / Protocols / Services X SA-9 (4) External Information Systems | Consistent Interests of Consumers and Providers X SA-9 (5) External Information Systems | Processing, Storage, and Service Location X SA-10 Developer Configuration Management X SA-10 (1) Developer Configuration Management | Software / Firmware Integrity Verification X SA-11 Developer Security Testing and Evaluation X SA-11 (1) Developer Security Testing and Evaluation | Static Code Analysis X SA-11 (2) Developer Security Testing and Evaluation | Threat and Vulnerability Analyses X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 57. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 57 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 268 269 270 271 272 273 274 275 276 277 278 279 280 SA-11 (8) Developer Security Testing and Evaluation | Dynamic Code Analysis X Requirement: SA-11 (1) or SA-11 (8) or both Requirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed. SC-1 System and Communications Protection Policy and Procedures X X SC-1.b.1 [at least every 3 years] SC-1.b.2 [at least annually] SC-2 Application Partitioning X SC-4 Information In Shared Resources X SC-5 Denial of Service Protection X X SC-6 Resource Availability X SC-7 Boundary Protection X X SC-7 (3) Boundary Protection | Access Points X SC-7 (4) Boundary Protection | External Telecommunications Services X SC-7 (4). [at least annually] SC-7 (5) Boundary Protection | Deny by Default / Allow by Exception X SC-7 (7) Boundary Protection | Prevent Split Tunneling for Remote Devices X SC-7 (8) Boundary Protection | Route Traffic to Authenticated Proxy Servers X SC-7 (12) Boundary Protection | Host- Based Protection X
  • 58. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 58 of 66 2 3 A B C D Base Control ID Control Title Low Mod 268 269 270 271 272 273 274 275 276 277 278 279 280 SA-11 (8) Developer Security Testing and Evaluation | Dynamic Code Analysis X SC-1 System and Communications Protection Policy and Procedures X X SC-2 Application Partitioning X SC-4 Information In Shared Resources X SC-5 Denial of Service Protection X X SC-6 Resource Availability X SC-7 Boundary Protection X X SC-7 (3) Boundary Protection | Access Points X SC-7 (4) Boundary Protection | External Telecommunications Services X SC-7 (5) Boundary Protection | Deny by Default / Allow by Exception X SC-7 (7) Boundary Protection | Prevent Split Tunneling for Remote Devices X SC-7 (8) Boundary Protection | Route Traffic to Authenticated Proxy Servers X SC-7 (12) Boundary Protection | Host- Based Protection X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 59. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 59 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 281 282 283 284 285 286 287 288 289 290 SC-7 (13) Boundary Protection | Isolation of Security Tools / Mechanisms / Support Components X SC-7 (13). Requirement: The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets. SC-7 (18) Boundary Protection | Fail Secure X SC-8 Transmission Confidentiality and Integrity X SC-8. [confidentiality AND integrity] SC-8 (1) Transmission Confidentiality and Integrity | Cryptographic or Alternate Physical Protection X SC-8 (1). [prevent unauthorized disclosure of information AND detect changes to information] [a hardened or alarmed carrier Protective Distribution System (PDS)] SC-10 Network Disconnect X SC-10. [no longer than 30 minutes for RAS- based sessions or no longer than 60 minutes for non-interactive user sessions] SC-12 Cryptographic Key Establishment and Management X X SC-12 Guidance: Federally approved cryptography SC-12 (2) Cryptographic Key Establishment and Management | Symmetric Keys X SC-12 (2). [NIST FIPS-compliant] SC-12 (3) Cryptographic Key Establishment and Management | Asymmetric Keys X SC-13 Cryptographic Protection X X [FIPS-validated or NSA-approved cryptography] SC-15 Collaborative Computing Devices X X SC-15a. [no exceptions]
  • 60. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 60 of 66 2 3 A B C D Base Control ID Control Title Low Mod 281 282 283 284 285 286 287 288 289 290 SC-7 (13) Boundary Protection | Isolation of Security Tools / Mechanisms / Support Components X SC-7 (18) Boundary Protection | Fail Secure X SC-8 Transmission Confidentiality and Integrity X SC-8 (1) Transmission Confidentiality and Integrity | Cryptographic or Alternate Physical Protection X SC-10 Network Disconnect X SC-12 Cryptographic Key Establishment and Management X X SC-12 (2) Cryptographic Key Establishment and Management | Symmetric Keys X SC-12 (3) Cryptographic Key Establishment and Management | Asymmetric Keys X SC-13 Cryptographic Protection X X SC-15 Collaborative Computing Devices X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 61. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 61 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 291 292 293 294 295 296 297 298 299 300 301 302 303 304 SC-17 Public Key Infrastructure Certificates X SC-18 Mobile Code X SC-19 Voice Over Internet Protocol X SC-20 Secure Name / Address Resolution Service (Authoritative Source) X X SC-21 Secure Name / Address Resolution Service (Recursive or Caching Resolver) X X SC-22 Architecture and Provisioning for Name / Address Resolution Service X X SC-23 Session Authenticity X SC-28 Protection of Information At Rest X SC-28. [confidentiality AND integrity] SC-28. Guidance: The organization supports the capability to use cryptographic mechanisms to protect information at rest. SC-28 (1) Protection Of Information At Rest | Cryptographic Protection X SC-39 Process Isolation X X SI-1 System and Information Integrity Policy and Procedures X X SI-1.b.1 [at least every 3 years] SI-1.b.2 [at least annually] SI-2 Flaw Remediation X X SI-2c. [Within 30 days of release of updates] SI-2 (2) Flaw Remediation | Automated Flaw Remediation Status X SI-2 (2). [at least monthly] SI-2 (3) Flaw Remediation | Time to Remediate Flaws / Benchmarks for Corrective Actions X
  • 62. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 62 of 66 2 3 A B C D Base Control ID Control Title Low Mod 291 292 293 294 295 296 297 298 299 300 301 302 303 304 SC-17 Public Key Infrastructure Certificates X SC-18 Mobile Code X SC-19 Voice Over Internet Protocol X SC-20 Secure Name / Address Resolution Service (Authoritative Source) X X SC-21 Secure Name / Address Resolution Service (Recursive or Caching Resolver) X X SC-22 Architecture and Provisioning for Name / Address Resolution Service X X SC-23 Session Authenticity X SC-28 Protection of Information At Rest X SC-28 (1) Protection Of Information At Rest | Cryptographic Protection X SC-39 Process Isolation X X SI-1 System and Information Integrity Policy and Procedures X X SI-2 Flaw Remediation X X SI-2 (2) Flaw Remediation | Automated Flaw Remediation Status X SI-2 (3) Flaw Remediation | Time to Remediate Flaws / Benchmarks for Corrective Actions X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 63. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 63 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 305 306 307 308 309 310 311 312 313 314 315 316 317 SI-3 Malicious Code Protection X X SI-3.c.1 [at least weekly] [to include endpoints] SI-3.c.2 [to include alerting administrator or defined security personnel] SI-3 (1) Malicious Code Protection | Central Management X SI-3 (2) Malicious Code Protection | Automatic Updates X SI-3 (7) Malicious Code Protection | Nonsignature-Based Detection X SI-4 Information System Monitoring X X SI-4 (1) Information System Monitoring | System-Wide Intrusion Detection System X SI-4 (2) Information System Monitoring | Automated Tools For Real- Time Analysis X SI-4 (4) Information System Monitoring | Inbound and Outbound Communications Traffic X SI-4 (4). [continually] SI-4 (5) Information System Monitoring | System-Generated Alerts X SI-4(5) Guidance: In accordance with the incident response plan. SI-4 (14) Information System Monitoring | Wireless Intrusion Detection X SI-4 (16) Information System Monitoring | Correlate Monitoring Information X SI-4 (23) Information System Monitoring | Host-Based Devices X SI-5 Security Alerts, Advisories, and Directives X X SI-5a. [to include US-CERT] SI-5c. [to include system security personnel and administrators with configuration/patch- management responsibilities]
  • 64. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 64 of 66 2 3 A B C D Base Control ID Control Title Low Mod 305 306 307 308 309 310 311 312 313 314 315 316 317 SI-3 Malicious Code Protection X X SI-3 (1) Malicious Code Protection | Central Management X SI-3 (2) Malicious Code Protection | Automatic Updates X SI-3 (7) Malicious Code Protection | Nonsignature-Based Detection X SI-4 Information System Monitoring X X SI-4 (1) Information System Monitoring | System-Wide Intrusion Detection System X SI-4 (2) Information System Monitoring | Automated Tools For Real- Time Analysis X SI-4 (4) Information System Monitoring | Inbound and Outbound Communications Traffic X SI-4 (5) Information System Monitoring | System-Generated Alerts X SI-4 (14) Information System Monitoring | Wireless Intrusion Detection X SI-4 (16) Information System Monitoring | Correlate Monitoring Information X SI-4 (23) Information System Monitoring | Host-Based Devices X SI-5 Security Alerts, Advisories, and Directives X X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization
  • 65. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 65 of 66 2 3 A B C D E F G H I J K Base Parameters Implementation Status Control ID Control Title Low Mod FedRAMP Defined Assignment/Selection Parameters Additional FedRAMP Requirements And Guidance In Place Partially Implemented Planned Alternative Implementation N/A 318 319 320 321 322 323 324 325 326 327 328 SI-6 Security Function Verification X SI-6b [to include upon system startup and/or restart at least monthly] SI-6c [to include system administrators and security personnel] SI-6d [to include notification of system administrators and security personnel] SI-7 Software, Firmware, and Information Integrity X SI-7 (1) Software, Firmware, and Information Integrity | Integrity Checks X SI-7 (1). [Selection to include security relevant events and at least monthly] SI-7 (7) Software, Firmware, and Information Integrity | Integration of Detection and Response X SI-8 Spam Protection X SI-8 (1) Spam Protection | Central Management X SI-8 (2) Spam Protection | Automatic Updates X SI-10 Information Input Validation X SI-11 Error Handling X SI-12 Information Handling and Retention X X SI-16 Memory Protection X
  • 66. FedRAMP Control Implementation Summary Template v4.1 Cross Matrixed to FedRAMP Baseline Controls Rev. 4 Page 66 of 66 2 3 A B C D Base Control ID Control Title Low Mod 318 319 320 321 322 323 324 325 326 327 328 SI-6 Security Function Verification X SI-7 Software, Firmware, and Information Integrity X SI-7 (1) Software, Firmware, and Information Integrity | Integrity Checks X SI-7 (7) Software, Firmware, and Information Integrity | Integration of Detection and Response X SI-8 Spam Protection X SI-8 (1) Spam Protection | Central Management X SI-8 (2) Spam Protection | Automatic Updates X SI-10 Information Input Validation X SI-11 Error Handling X SI-12 Information Handling and Retention X X SI-16 Memory Protection X L M N O P Q R Control Origination Service Provider- Corporate Service Provider- System Specific Service Provider Hybrid: (Service Provider - Corporate and Service Provider - System Specific) Configured by Customer (Customer - System Specific) Provided by Customer (Customer- System Specific) Shared (Service Provider and Customer Responsibility) Inherited from Pre- Existing Provisional Authorization