Fedramp system Security Plan (ssp) High Baseline Template


SI-5 What is the solution and how is it implemented?



Download 1.2 Mb.
Page450/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   446   447   448   449   450   451   452   453   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
SI-5 What is the solution and how is it implemented?

Part a




Part b




Part c




Part d





SI-5 (1) Control Enhancement (H)


The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.

SI-5 (1)

Control Summary Information

Responsible Role:

Implementation Status (check all that apply):

Implemented

☐ Partially implemented

☐ Planned

Alternative implementation

Not applicable



Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,





SI-5 (1) What is the solution and how is it implemented?





SI-6 Security Functionality Verification (M) (H)


The information system:

  1. Verifies the correct operation of [Assignment: organization-defined security functions];

  2. Performs this verification [FedRAMP Assignment: to include upon system startup and/or restart at least monthly];

  3. Notifies [FedRAMP Assignment: to include system administrators and security personnel] of failed security verification tests; and

  4. [Selection (one or more): shuts the information system down; restarts the information system; [FedRAMP Assignment: to include notification of system administrators and security personnel] when anomalies are discovered.



SI-6

Control Summary Information

Responsible Role:

Parameter SI-6(a):

Parameter SI-6(b):

Parameter SI-6(c):

Parameter SI-6(d)-1:

Parameter SI-6(d)-2:

Implementation Status (check all that apply):

☐ Implemented

☐ Partially implemented

☐ Planned

☐ Alternative implementation

☐ Not applicable



Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,





SI-6 What is the solution and how is it implemented?

Part a




Part b




Part c




Part d






Download 1.2 Mb.

Share with your friends:
1   ...   446   447   448   449   450   451   452   453   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page