Fedramp system Security Plan (ssp) High Baseline Template


CM-8 What is the solution and how is it implemented?



Download 1.2 Mb.
Page177/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   173   174   175   176   177   178   179   180   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
CM-8 What is the solution and how is it implemented?

Part a




Part b





CM-8 (1) Control Enhancement (M) (H)


The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.

Instruction: A description of the inventory information is documented in Section 10. It is not necessary to re-document it here.

Delete this and all other instructions from your final version of this document.

CM-8 (1)

Control Summary Information

Responsible Role:

Implementation Status (check all that apply):

Implemented

Partially implemented

Planned

Alternative implementation

Not applicable

Control Origination (check all that apply):

Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,



CM-8 (1) What is the solution and how is it implemented?






Download 1.2 Mb.

Share with your friends:
1   ...   173   174   175   176   177   178   179   180   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page