| AC-1 | Policy and Procedures | Develop and disseminate access control policy and procedures; review at least annually (FedRAMP parameter); update follo... |
| AC-10 | Concurrent Session Control | Limit concurrent sessions per account to FedRAMP-defined number (3 for privileged, 2 for non-privileged). |
| AC-11 | Device Lock | Prevent further access by initiating device lock after 15 minutes inactivity (FedRAMP) or upon user request. |
| AC-12 | Session Termination | Automatically terminate user session after FedRAMP-defined conditions (idle timeout, trigger events). |
| AC-14 | Permitted Actions Without Identification or Authentication | Identify and document actions allowed without identification or authentication. |
| AC-17 | Remote Access | Establish usage restrictions, configuration requirements, and authorize remote access prior to allowing. |
| AC-17(1) | Monitoring and Control | Employ automated mechanisms to monitor and control remote access. |
| AC-17(2) | Protection of Confidentiality and Integrity Using Encryption | Implement cryptographic mechanisms to protect remote access sessions; FIPS-validated. |
| AC-17(3) | Managed Access Control Points | Route remote accesses through FedRAMP-defined number of managed network access control points. |
| AC-17(4) | Privileged Commands and Access | Authorize execution of privileged commands and access to security-relevant information via remote access only for define... |
| AC-18 | Wireless Access | Establish configuration requirements, usage restrictions, authorize wireless access. |
| AC-18(1) | Authentication and Encryption | Protect wireless access using authentication and encryption (WPA2/3 Enterprise minimum). |
| AC-19 | Access Control for Mobile Devices | Establish configuration requirements and usage restrictions for mobile devices. |
| AC-19(5) | Full Device or Container-Based Encryption | Employ full device or container-based encryption on mobile devices. |
| AC-2 | Account Management | Manage accounts; review at least monthly for privileged, every six months for non-privileged (FedRAMP); notify within Fe... |
| AC-2(1) | Automated System Account Management | Support account management via automated mechanisms; required at HIGH baseline. |
| AC-2(12) | Account Monitoring for Atypical Usage | Monitor accounts for atypical use; report anomalies to defined personnel. |
| AC-2(13) | Disable Accounts for High-Risk Individuals | Disable accounts of users posing significant risk within FedRAMP-defined timeframe (1 hour). |
| AC-2(2) | Automated Temporary and Emergency Account Management | Automatically disable temporary and emergency accounts within FedRAMP-defined timeframe (no longer than 24 hours). |
| AC-2(3) | Disable Accounts | Disable accounts within FedRAMP-defined timeframe when no longer required, terminated, or inactive (35 days inactive). |
| AC-2(4) | Automated Audit Actions | Automatically audit account creation, modification, enabling, disabling, removal; notify defined personnel. |
| AC-2(5) | Inactivity Logout | Require users to log out when inactivity exceeds FedRAMP-defined period (15 minutes for non-mobile, 30 for mobile). |
| AC-2(7) | Privileged User Accounts | Establish and administer privileged accounts per role-based scheme; monitor role assignments; revoke when no longer need... |
| AC-2(9) | Restrictions on Use of Shared and Group Accounts | Only permit shared/group accounts when meeting FedRAMP-defined conditions; document and approve. |
| AC-20 | Use of External Systems | Establish terms and conditions for use of external systems; prohibit unless authorized. |
| AC-20(1) | Limits on Authorized Use | Permit use of external systems only after verifying security/privacy controls or approved connection agreement. |
| AC-20(2) | Portable Storage Devices Restricted Use | Restrict use of organization-controlled portable storage on external systems. |
| AC-21 | Information Sharing | Enable authorized users to determine whether access authorizations match sharing restrictions. |
| AC-22 | Publicly Accessible Content | Designate users authorized to post; train them; review content quarterly for nonpublic information. |
| AC-3 | Access Enforcement | Enforce approved authorizations for logical access in accordance with policy. |
| AC-4 | Information Flow Enforcement | Enforce approved information flow control policies between connected systems and within the system. |
| AC-4(21) | Physical or Logical Separation of Information Flows | Separate information flows logically or physically using FedRAMP-defined mechanisms. |
| AC-5 | Separation of Duties | Identify and document duties requiring separation; define access authorizations to support. |
| AC-6 | Least Privilege | Employ least privilege; allow only authorized access necessary to accomplish assigned tasks. |
| AC-6(1) | Authorize Access to Security Functions | Authorize access for FedRAMP-defined personnel to security functions and security-relevant information. |
| AC-6(10) | Prohibit Non-Privileged Users from Executing Privileged Functions | Prevent non-privileged users from executing privileged functions. |
| AC-6(2) | Non-Privileged Access for Nonsecurity Functions | Require privileged users to use non-privileged accounts for nonsecurity functions. |
| AC-6(5) | Privileged Accounts | Restrict privileged accounts to FedRAMP-defined personnel or roles. |
| AC-6(7) | Review of User Privileges | Review privileges at least quarterly (FedRAMP) and reassign or remove as needed. |
| AC-6(9) | Log Use of Privileged Functions | Log execution of privileged functions. |
| AC-7 | Unsuccessful Logon Attempts | Enforce limit of 3 consecutive invalid logon attempts within 15 minutes (FedRAMP); lock for 30 min or until released. |
| AC-8 | System Use Notification | Display approved system use notification/banner before granting access; FedRAMP requires specific language. |
| AT-1 | Policy and Procedures | Develop, disseminate, and review awareness and training policy and procedures at least annually. |
| AT-2 | Literacy Training and Awareness | Provide security awareness training within FedRAMP-defined timeframe of onboarding, on system change, and at least annua... |
| AT-2(2) | Insider Threat | Include insider threat recognition and reporting in awareness training. |
| AT-2(3) | Social Engineering and Mining | Include social engineering and social mining recognition in training. |
| AT-3 | Role-Based Training | Provide role-based security training to personnel with significant security responsibilities before authorizing access a... |
| AT-4 | Training Records | Document and monitor security training; retain records for FedRAMP-defined period (5 years). |
| AU-1 | Policy and Procedures | Develop and review audit/accountability policy annually. |
| AU-11 | Audit Record Retention | Retain audit records for at least one year (FedRAMP minimum) with 90 days immediately accessible online. |
| AU-12 | Audit Record Generation | Provide audit record generation capability on all system components specified in AU-2. |
| AU-2 | Event Logging | Identify event types selected for logging including FedRAMP minimum list; review and update at least annually. |
| AU-3 | Content of Audit Records | Audit records must contain: type, when, where, source, outcome, identity associated. |
| AU-3(1) | Additional Audit Information | Generate audit records containing FedRAMP-defined additional information (session, host, full text of executed commands)... |
| AU-4 | Audit Log Storage Capacity | Allocate audit log storage capacity to accommodate FedRAMP-defined retention period. |
| AU-5 | Response to Audit Logging Process Failures | Alert defined personnel on audit failure within FedRAMP timeframe; take defined action (overwrite oldest, shutdown, stop... |
| AU-6 | Audit Record Review, Analysis, and Reporting | Review and analyze audit records at least weekly (FedRAMP); report findings to defined personnel. |
| AU-6(1) | Automated Process Integration | Integrate audit review with automated mechanisms (SIEM). |
| AU-6(3) | Correlate Audit Record Repositories | Analyze and correlate audit records across different repositories. |
| AU-7 | Audit Record Reduction and Report Generation | Provide capability for audit record reduction and on-demand report generation. |
| AU-7(1) | Automatic Processing | Process audit records for events of interest based on defined criteria. |
| AU-8 | Time Stamps | Use internal system clocks; record timestamps with FedRAMP-defined granularity (1 second), UTC or known offset. |
| AU-9 | Protection of Audit Information | Protect audit information and tools from unauthorized access, modification, deletion. |
| AU-9(2) | Store on Separate Physical Systems or Components | Store audit records on separate physical system/component at least weekly (FedRAMP). |
| AU-9(4) | Access by Subset of Privileged Users | Authorize access to audit functionality only to subset of privileged users. |
| CA-1 | Policy and Procedures | Develop and review assessment/authorization policy at least annually. |
| CA-2 | Control Assessments | Assess controls annually (FedRAMP); third-party assessor (3PAO) required; produce SAR. |
| CA-2(1) | Independent Assessors | Employ independent assessors; FedRAMP-accredited 3PAO required. |
| CA-3 | Information Exchange | Approve and manage exchange of information with external systems using ISA, MOU, contract; review annually. |
| CA-5 | Plan of Action and Milestones | Develop POAM; update at least monthly (FedRAMP); track remediation timelines (HIGH 30 days, MOD 90). |
| CA-6 | Authorization | Senior official authorizes system; reauthorize every three years or upon significant change. |
| CA-7 | Continuous Monitoring | Establish continuous monitoring strategy with FedRAMP-defined metrics, monitoring frequencies, ongoing assessments. |
| CA-7(1) | Independent Assessment | Employ independent assessors for ongoing monitoring; FedRAMP 3PAO annual. |
| CA-8 | Penetration Testing | Conduct penetration testing annually on FedRAMP-defined systems and components. |
| CA-9 | Internal System Connections | Authorize internal connections of components to system; document interface characteristics. |
| CM-1 | Policy and Procedures | Develop and review configuration management policy annually. |
| CM-10 | Software Usage Restrictions | Use software in accordance with contracts and copyright laws; track licenses; document peer-to-peer file sharing control... |
| CM-11 | User-Installed Software | Establish policies governing installation of software by users; enforce; monitor compliance. |
| CM-2 | Baseline Configuration | Develop and maintain baseline configurations; review and update annually (FedRAMP) and when required. |
| CM-2(2) | Automation Support for Accuracy and Currency | Maintain baseline currency via automated mechanisms. |
| CM-2(3) | Retention of Previous Configurations | Retain FedRAMP-defined number of previous baseline configurations (3) to support rollback. |
| CM-2(7) | Configure Systems and Components for High-Risk Areas | Issue systems/devices with FedRAMP-defined security safeguards to individuals traveling to high-risk locations. |
| CM-3 | Configuration Change Control | Determine, document, and approve changes; track, review, audit; CAB or equivalent; analyze security impact. |
| CM-3(2) | Testing, Validation, and Documentation of Changes | Test, validate, and document changes before implementing on operational system. |
| CM-3(4) | Security and Privacy Representatives | Require security and privacy representatives on change board for FedRAMP-defined configuration changes. |
| CM-4 | Impact Analyses | Analyze changes to determine potential security/privacy impacts. |
| CM-5 | Access Restrictions for Change | Define, document, approve, enforce physical and logical access restrictions for changes. |
| CM-6 | Configuration Settings | Establish/document configuration settings using checklists; CIS/USGCB/DISA STIG when available; HIGH baseline. |
| CM-6(1) | Automated Management, Application, and Verification | Manage, apply, and verify configuration settings via automated mechanisms; HIGH only. |
| CM-7 | Least Functionality | Configure system to provide only essential capabilities; prohibit unnecessary functions, services, ports, protocols. |
| CM-7(1) | Periodic Review | Review system functions, ports, protocols, services at least monthly (FedRAMP); disable as unnecessary. |
| CM-7(2) | Prevent Program Execution | Prevent program execution according to FedRAMP-defined policies (rules of behavior). |
| CM-7(5) | Authorized Software Allow-by-Exception | Identify and maintain authorized software list; employ allowlist; review at least annually; HIGH requirement. |
| CM-8 | System Component Inventory | Develop and document inventory of system components; review and update at least monthly (FedRAMP). |
| CM-8(1) | Updates During Installation and Removal | Update inventory as part of component installations, removals, updates. |
| CM-8(3) | Automated Unauthorized Component Detection | Employ automated mechanisms to detect unauthorized components at FedRAMP-defined frequency; HIGH only continuous. |
| CM-9 | Configuration Management Plan | Develop, document, implement configuration management plan addressing roles, processes, items under CM, identification s... |
| CP-1 | Policy and Procedures | Develop and review contingency planning policy at least annually. |
| CP-10 | System Recovery and Reconstitution | Provide for recovery and reconstitution of system to known state within RTO. |
| CP-2 | Contingency Plan | Develop contingency plan; review and update annually (FedRAMP); coordinate with related plans. |
| CP-2(1) | Coordinate with Related Plans | Coordinate contingency plan with related plans (BCP, DRP, COOP, IRP). |
| CP-2(3) | Resume Mission and Business Functions | Plan for resumption of mission/business functions within FedRAMP-defined time period after contingency plan activation. |
| CP-3 | Contingency Training | Provide contingency training to users assigned roles; within FedRAMP timeframe of role assignment and at least annually. |
| CP-4 | Contingency Plan Testing | Test contingency plan at least annually (FedRAMP) using FedRAMP-defined tests; review test results. |
| CP-4(1) | Coordinate with Related Plans | Coordinate contingency plan testing with related plan testing. |
| CP-6 | Alternate Storage Site | Establish alternate storage site with agreements to permit storage and retrieval of system backup information. |
| CP-7 | Alternate Processing Site | Establish alternate processing site with agreements for resumption of operations within FedRAMP-defined RTO. |
| CP-8 | Telecommunications Services | Establish alternate telecommunications services with agreements to permit resumption of system operations. |
| CP-9 | System Backup | Conduct backups of user-level, system-level, and security-related documentation; FedRAMP-defined frequency (daily increm... |
| CP-9(1) | Testing for Reliability and Integrity | Test backup information annually to verify reliability and integrity. |
| IA-1 | Policy and Procedures | Develop and review identification and authentication policy at least annually. |
| IA-11 | Re-Authentication | Require re-authentication when FedRAMP-defined circumstances occur (role change, privilege change, time period elapsed). |
| IA-2 | Identification and Authentication (Organizational Users) | Uniquely identify and authenticate organizational users and associate identity with processes acting on behalf of users. |
| IA-2(1) | MFA to Privileged Accounts | Implement MFA for access to privileged accounts; phishing-resistant per FedRAMP. |
| IA-2(12) | Acceptance of PIV Credentials | Accept and electronically verify Personal Identity Verification credentials. |
| IA-2(2) | MFA to Non-Privileged Accounts | Implement MFA for non-privileged accounts; phishing-resistant per FedRAMP. |
| IA-2(8) | Access to Accounts Replay Resistant | Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts. |
| IA-3 | Device Identification and Authentication | Uniquely identify and authenticate devices before establishing connection. |
| IA-4 | Identifier Management | Manage identifiers; uniquely identify; prevent reuse for FedRAMP-defined period. |
| IA-5 | Authenticator Management | Manage authenticators; verify identity prior to issuing; establish initial content; protect. |
| IA-5(1) | Password-Based Authentication | Enforce password complexity per NIST SP 800-63B; minimum 12 characters (FedRAMP); compare against breach lists. |
| IA-5(2) | Public Key-Based Authentication | Enforce authorized use of public key-based authentication; validate certificates; map identity to account. |
| IA-5(6) | Protection of Authenticators | Protect authenticators commensurate with security category of information they protect. |
| IA-6 | Authentication Feedback | Obscure authentication feedback during authentication process. |
| IA-7 | Cryptographic Module Authentication | Implement authentication to cryptographic modules meeting FIPS 140 (FedRAMP requires FIPS-validated). |
| IA-8 | Identification and Authentication (Non-Organizational Users) | Uniquely identify and authenticate non-organizational users (e.g., federal customers). |
| IR-1 | Event Detection and Triage | Detect, triage and declare cyber events using documented criteria and severity levels. |
| IR-2 | Incident Response and Recovery | Respond to, contain and recover from cyber incidents affecting IT and OT functions. |
| IR-3 | Continuity of Operations | Plan, exercise and maintain continuity of the function during and after cyber incidents. |
| IR-4 | Incident Handling | Implement IR capability for preparation, detection/analysis, containment, eradication, recovery. |
| IR-4(1) | Automated Incident Handling Processes | Support incident handling via automated mechanisms. |
| IR-5 | Incident Monitoring | Track and document incidents. |
| IR-6 | Incident Reporting | Require personnel to report incidents to organizational authorities within FedRAMP timeframe; report to FedRAMP PMO and... |
| IR-6(1) | Automated Reporting | Report incidents via automated mechanisms. |
| IR-7 | Incident Response Assistance | Provide IR support resource (help desk, support group) for incident handling assistance. |
| IR-8 | Incident Response Plan | Develop and implement IRP; review and update annually; distribute. |
| MA-1 | Policy and Procedures | Develop and review maintenance policy at least annually. |
| MA-2 | Controlled Maintenance | Schedule, document, review records of maintenance, repair, replacement of components. |
| MA-4 | Nonlocal Maintenance | Approve and monitor nonlocal maintenance activities; use strong authentication. |
| MA-5 | Maintenance Personnel | Establish process for authorizing maintenance personnel; maintain list of authorized personnel; supervise unauthorized. |
| MP-1 | Policy and Procedures | Develop and review media protection policy at least annually. |
| MP-2 | Media Access | Restrict access to FedRAMP-defined types of digital and non-digital media to authorized personnel. |
| MP-3 | Media Marking | Mark system media indicating distribution limitations, handling caveats, security markings. |
| MP-4 | Media Storage | Physically control and securely store FedRAMP-defined types of media within FedRAMP-defined controlled areas. |
| MP-5 | Media Transport | Protect and control media during transport outside controlled areas; maintain accountability; document activities; restr... |
| MP-6 | Media Sanitization | Sanitize media prior to disposal, release, or reuse using FedRAMP-defined methods (NIST SP 800-88). |
| MP-7 | Media Use | Restrict or prohibit use of FedRAMP-defined types of media on FedRAMP-defined systems using safeguards. |
| PE-1 | Policy and Procedures | Develop and review physical/environmental policy at least annually. |
| PE-12 | Emergency Lighting | Employ and maintain automatic emergency lighting activating on power outage covering emergency exits. |
| PE-13 | Fire Protection | Employ and maintain fire suppression and detection devices independent of energy source. |
| PE-14 | Environmental Controls | Maintain temperature and humidity within FedRAMP-defined acceptable levels; monitor at FedRAMP frequency. |
| PE-16 | Delivery and Removal | Authorize and control system components entering/exiting facility; maintain records. |
| PE-17 | Alternate Work Site | Determine alternate work sites; employ FedRAMP-defined controls at alternate sites; assess effectiveness. |
| PE-2 | Physical Access Authorizations | Develop, approve, maintain list of individuals with authorized facility access; review at least quarterly (FedRAMP). |
| PE-3 | Physical Access Control | Enforce physical access at entry/exit points; verify authorizations; control ingress/egress; maintain audit logs. |
| PE-6 | Monitoring Physical Access | Monitor physical access to facility; review access logs at least weekly (FedRAMP); coordinate review with IR. |
| PE-8 | Visitor Access Records | Maintain visitor access records for FedRAMP-defined period (1 year); review records monthly (FedRAMP). |
| PL-1 | Policy and Procedures | Develop and review planning policy at least annually. |
| PL-2 | System Security and Privacy Plans | Develop SSP that aligns with FedRAMP template; review and update annually. |
| PL-4 | Rules of Behavior | Establish and provide rules describing user responsibilities; receive signed acknowledgement. |
| PL-8 | Security and Privacy Architectures | Develop, document, maintain security/privacy architectures; review annually. |
| PS-1 | Policy and Procedures | Develop and review personnel security policy at least annually. |
| PS-2 | Position Risk Designation | Assign risk designation to positions; review and update at least every three years. |
| PS-3 | Personnel Screening | Screen individuals prior to authorizing access; rescreen at FedRAMP frequency per position risk; US citizenship may appl... |
| PS-4 | Personnel Termination | Disable access and revoke authenticators within FedRAMP-defined time (same day); conduct exit interview; retrieve proper... |
| PS-5 | Personnel Transfer | Review/confirm ongoing operational need for access when personnel transfer; modify access; notify within FedRAMP timefra... |
| PS-6 | Access Agreements | Develop access agreements; review and update annually; require signature before access. |
| PS-7 | External Personnel Security | Establish personnel security requirements for external providers; require providers to notify within FedRAMP timeframe o... |
| PS-8 | Personnel Sanctions | Employ formal sanctions for personnel failing to comply with security/privacy policies; notify defined personnel within... |
| RA-1 | Policy and Procedures | Develop and review risk assessment policy at least annually. |
| RA-2 | Security Categorization | Categorize system per FIPS 199; document; review and update annually. |
| RA-3 | Risk Assessment | Conduct risk assessment annually (FedRAMP); document; review and update. |
| RA-5 | Vulnerability Monitoring and Scanning | Scan for vulnerabilities monthly (FedRAMP); OS/network weekly, web app monthly, database monthly; remediate within FedRA... |
| RA-5(2) | Update Vulnerabilities to be Scanned | Update vulnerability list prior to scan, when new vulnerabilities identified, or at FedRAMP frequency. |
| RA-5(5) | Privileged Access | Implement privileged access authorization to FedRAMP-defined components for vulnerability scanning. |
| RA-7 | Identifies and Analyzes Risk | The organization identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis f... |
| SA-1 | Logging and Monitoring | Collect, retain and monitor logs from IT and OT assets to detect anomalous activity. |
| SA-10 | Developer Configuration Management | Require developer to perform CM during development, implementation, operation; document/track changes; implement only ap... |
| SA-11 | Developer Testing and Evaluation | Require developer to test at FedRAMP-defined depth and coverage; document; correct flaws. |
| SA-2 | Common Operating Picture | Establish a common operating picture across IT, OT and physical security functions for cyber events. |
| SA-3 | System Development Life Cycle | Manage system using SDLC incorporating security/privacy considerations. |
| SA-4 | Acquisition Process | Include security/privacy requirements in contracts; FedRAMP-defined assurance requirements. |
| SA-4(10) | Use of Approved PIV Products | Employ only information technology products on FIPS 201-approved products list for PIV capability. |
| SA-5 | System Documentation | Obtain administrator and user documentation; protect; distribute to FedRAMP-defined personnel. |
| SA-8 | Security and Privacy Engineering Principles | Apply FedRAMP-defined systems security and privacy engineering principles in development. |
| SA-9 | External System Services | Require providers of external system services to comply with security/privacy requirements; document oversight roles. |
| SA-9(2) | Identification of Functions, Ports, Protocols, and Services | Require providers to identify functions, ports, protocols, services required for external services. |
| SC-1 | Policy and Procedures | Develop and review system/comms protection policy at least annually. |
| SC-10 | Network Disconnect | Terminate network connection at end of session or after FedRAMP-defined inactivity period (no longer than 30 minutes). |
| SC-12 | Cryptographic Key Establishment and Management | Establish and manage cryptographic keys per FedRAMP requirements (FIPS-validated, key escrow/recovery as appropriate). |
| SC-13 | Cryptographic Protection | Implement FedRAMP-defined cryptographic uses and approved cryptography (FIPS 140 validated). |
| SC-15 | Collaborative Computing Devices and Applications | Prohibit remote activation of collaborative computing devices (cameras, mics) without explicit user indication; provide... |
| SC-17 | Public Key Infrastructure Certificates | Issue public key certificates under FedRAMP-defined policy or obtain from approved service providers. |
| SC-18 | Mobile Code | Define acceptable and unacceptable mobile code; authorize use; monitor. |
| SC-2 | Separation of System and User Functionality | Separate user functionality from system management functionality. |
| SC-20 | Secure Name/Address Resolution Service (Authoritative) | Provide artifacts for additional data origin authentication and integrity verification (DNSSEC) for child zones; FedRAMP... |
| SC-21 | Secure Name/Address Resolution Service (Recursive or Caching Resolver) | Request and perform data origin authentication and data integrity verification on name/address resolution responses; DNS... |
| SC-22 | Architecture and Provisioning for Name/Address Resolution Service | Ensure DNS systems are fault-tolerant and implement role separation. |
| SC-23 | Session Authenticity | Protect authenticity of communications sessions. |
| SC-28 | Protection of Information at Rest | Protect confidentiality and integrity of FedRAMP-defined information at rest. |
| SC-28(1) | Cryptographic Protection | Implement cryptographic mechanisms to prevent unauthorized disclosure/modification of FedRAMP-defined information on Fed... |
| SC-39 | Process Isolation | Maintain separate execution domain for each executing system process. |
| SC-4 | Information in Shared System Resources | Prevent unauthorized and unintended information transfer via shared system resources. |
| SC-5 | Denial-of-Service Protection | Protect against or limit effects of DoS attacks using FedRAMP-defined safeguards. |
| SC-7 | Boundary Protection | Monitor/control communications at external boundary and key internal boundaries; implement subnetworks for publicly acce... |
| SC-7(3) | Access Points | Limit number of external network connections to system; TIC-aligned. |
| SC-7(4) | External Telecommunications Services | Implement managed interface for each external telecommunications service; establish traffic flow policy; protect confide... |
| SC-7(5) | Deny by Default Allow by Exception | Deny network communications by default; allow by exception. |
| SC-7(7) | Split Tunneling for Remote Devices | Prevent split tunneling for remote devices unless securely provisioned. |
| SC-7(8) | Route Traffic to Authenticated Proxy Servers | Route internal traffic to FedRAMP-defined external networks through authenticated proxies. |
| SC-8 | Transmission Confidentiality and Integrity | Protect confidentiality and integrity of transmitted information using cryptographic mechanisms. |
| SC-8(1) | Cryptographic Protection | Implement FIPS-validated cryptographic mechanisms to prevent unauthorized disclosure and detect changes during transmiss... |
| SI-1 | Policy and Procedures | Develop and review system/information integrity policy at least annually. |
| SI-10 | Information Input Validation | Check validity of FedRAMP-defined information inputs. |
| SI-11 | Error Handling | Generate error messages providing necessary info without revealing sensitive info; reveal only to authorized. |
| SI-12 | Information Management and Retention | Manage and retain information consistent with applicable laws, regulations, policies, standards. |
| SI-16 | Memory Protection | Implement FedRAMP-defined safeguards to protect memory from unauthorized code execution (DEP, ASLR). |
| SI-2 | Flaw Remediation | Identify, report, and correct system flaws; remediate within FedRAMP-defined timeframes (HIGH critical 15d, high 30d). |
| SI-2(2) | Automated Flaw Remediation Status | Determine status of flaw remediation via automated mechanisms at FedRAMP-defined frequency (at least monthly). |
| SI-3 | Malicious Code Protection | Implement signature-based and non-signature-based malicious code protection; configure to scan endpoints and entry/exit... |
| SI-4 | System Monitoring | Monitor system to detect attacks; identify unauthorized use; deploy monitoring devices at boundaries and key internal po... |
| SI-4(2) | Automated Tools and Mechanisms for Real-Time Analysis | Employ automated tools to support near-real-time analysis of events. |
| SI-4(4) | Inbound and Outbound Communications Traffic | Determine criteria for unusual or unauthorized activity; monitor inbound/outbound communications. |
| SI-4(5) | System-Generated Alerts | Alert FedRAMP-defined personnel when indications of compromise/potential compromise occur. |
| SI-5 | Security Alerts, Advisories, and Directives | Receive alerts/advisories/directives from FedRAMP-defined external organizations (US-CERT, CISA); generate internal; dis... |
| SI-7 | Software, Firmware, and Information Integrity | Employ integrity verification tools to detect unauthorized changes to software, firmware, information; HIGH only. |
| SI-7(1) | Integrity Checks | Perform integrity checks of software, firmware, information at FedRAMP-defined frequency or trigger events. |
| SI-7(7) | Integration of Detection and Response | Incorporate detection of FedRAMP-defined unauthorized changes into IR capability. |
| SI-8 | Spam Protection | Employ spam protection at entry/exit points; update spam protection mechanisms when new releases available. |
| SR-1 | Policy and Procedures (SR-1) | Develop, document, disseminate, and review supply chain risk management policy and procedures at defined frequency. |
| SR-10 | Inspection of Systems or Components (SR-10) | Inspect systems or components at defined frequency or upon indications of tampering to detect compromise. |
| SR-11 | Component Authenticity (SR-11) | Implement anti-counterfeit policy and procedures to detect and prevent counterfeit components. |
| SR-12 | Component Disposal (SR-12) | Dispose of data, documentation, tools, or system components using defined techniques and methods. |
| SR-2 | Supply Chain Risk Management Plan (SR-2) | Develop a C-SCRM plan for managing supply chain risks for systems, components, and services; review and update at define... |
| SR-3 | Supply Chain Controls and Processes (SR-3) | Establish processes to identify, protect, detect, respond, and recover across the supply chain lifecycle. |
| SR-5 | Acquisition Strategies, Tools, and Methods (SR-5) | Employ acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply... |
| SR-6 | Supplier Assessments and Reviews (SR-6) | Assess and review the supply chain risk posture of suppliers at defined frequency and after significant events. |
| SR-8 | Notification Agreements (SR-8) | Establish agreements with suppliers for notification of supply chain compromises and relevant changes. |