Fedramp system Security Plan (ssp) High Baseline Template


Control Summary Information



Download 1.2 Mb.
Page225/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   221   222   223   224   225   226   227   228   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
Control Summary Information

Responsible Role:

Parameter IA-1 (a):

Parameter IA-1 (a):

Parameter IA-1 (b)(1):

Implementation Status (check all that apply):

Implemented

Partially implemented

Planned

Alternative implementation

Not applicable

Control Origination (check all that apply):

Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)



IA-1 What is the solution and how is it implemented?

Part a




Part b





IA-2 User Identification and Authentication (L) (M) (H)


The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).

IA-2

Control Summary Information

Responsible Role:

Implementation Status (check all that apply):

☐ Implemented

☐ Partially implemented

☐ Planned

☐ Alternative implementation

☐ Not applicable

Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,



IA-2 What is the solution and how is it implemented?





IA-2 (1) Control Enhancement (L) (M) (H)


The information system implements multifactor authentication for network access to privileged accounts.

IA-2 (1)

Control Summary Information

Responsible Role:

Implementation Status (check all that apply):

☐ Implemented

☐ Partially implemented

☐ Planned

☐ Alternative implementation

☐ Not applicable

Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,



IA-2 (1) What is the solution and how is it implemented?






Download 1.2 Mb.

Share with your friends:
1   ...   221   222   223   224   225   226   227   228   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page