Fedramp system Security Plan (ssp) High Baseline Template


AC-2 (11) What is the solution and how is it implemented?



Download 1.2 Mb.
Page44/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   40   41   42   43   44   45   46   47   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
AC-2 (11) What is the solution and how is it implemented?





AC-2 (12) Control Enhancement (H)


The organization:

  1. Monitors information system accounts for [Assignment: organization-defined atypical use]; and

  2. Reports atypical usage of information system accounts to [FedRAMP Assignment: at a minimum, the ISSO and/or similar role within the organization].

AC-2 (12) (a) and AC-2 (12) (b) Additional FedRAMP Requirements and Guidance: Required for privileged accounts.

AC-2 (12)

Control Summary Information

Responsible Role:

Parameter AC-2(12)(a):

Parameter AC-2(12)(b):

Implementation Status (check all that apply):

Implemented

☐ Partially implemented

Planned

☐ Alternative implementation

Not applicable

Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,



AC-2 (12) What is the solution and how is it implemented?

Part a




Part b






Download 1.2 Mb.

Share with your friends:
1   ...   40   41   42   43   44   45   46   47   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page