Fedramp system Security Plan (ssp) High Baseline Template


PS-7 What is the solution and how is it implemented?



Download 1.2 Mb.
Page345/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   341   342   343   344   345   346   347   348   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
PS-7 What is the solution and how is it implemented?

Part a




Part b




Part c




Part d




Part e





PS-8 Personnel Sanctions (H)


The organization:

  1. Employs a formal sanctions process for personnel failing to comply with established information security policies and procedures; and

  2. Notifies [FedRAMP Assignment: at a minimum, the ISSO and/or similar role within the organization] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.



PS-8

Control Summary Information

Responsible Role:

Parameter PS-8(b)-1:

Parameter PS-8(b)-2:

Implementation Status (check all that apply):

☐ Implemented

☐ Partially implemented

☐ Planned

Alternative implementation

Not applicable



Control Origination (check all that apply):

Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,





PS-8 What is the solution and how is it implemented?

Part a




Part b





    1. Risk Assessment (RA)

RA-1 Risk Assessment Policy and Procedures (H)


The organization:

  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:

    1. A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and

    2. Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and

  1. Reviews and updates the current:

    1. Risk assessment policy [FedRAMP Assignment: at least annually]; and

    2. Risk assessment procedures [FedRAMP Assignment: at least annually or whenever a significant change occurs].



RA-1

Control Summary Information

Responsible Role:

Parameter RA-1(a):

Parameter RA-1(b)(1):

Parameter RA-1(b)(2):

Implementation Status (check all that apply):

☐ Implemented

☐ Partially implemented

☐ Planned

☐ Alternative implementation

☐ Not applicable



Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)





RA-1 What is the solution and how is it implemented?

Part a




Part b





RA-2 Security Categorization (L) (M) (H)


The organization:

  1. Categorizes information and the information system in accordance with applicable Federal Laws, Executive Orders, directives, policies, regulations, standards, and guidance;

  2. Documents the security categorization results (including supporting rationale) in the security plan for the information system; and

  3. Ensures the security categorization decision is reviewed and approved by the AO or authorizing official designated representative.



RA-2

Control Summary Information

Responsible Role:

Implementation Status (check all that apply):

☐ Implemented

☐ Partially implemented

☐ Planned

☐ Alternative implementation

☐ Not applicable



Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,





RA-2 What is the solution and how is it implemented?

Part a




Part b




Part c






Download 1.2 Mb.

Share with your friends:
1   ...   341   342   343   344   345   346   347   348   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page