Fedramp system Security Plan (ssp) High Baseline Template


AC-14 Permitted Actions without Identification or Authentication (L) (M) (H)



Download 1.2 Mb.
Page73/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   69   70   71   72   73   74   75   76   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics

AC-14 Permitted Actions without Identification or Authentication (L) (M) (H)


The organization:

  1. Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent with organizational missions/business functions; and

  2. Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.



AC-14

Control Summary Information

Responsible Role:

Parameter AC-14(a):

Implementation Status (check all that apply):

Implemented

☐ Partially implemented

Planned

☐ Alternative implementation

Not applicable

Control Origination (check all that apply):

☐ Service Provider Corporate

☐ Service Provider System Specific

☐ Service Provider Hybrid (Corporate and System Specific)

☐ Configured by Customer (Customer System Specific)

☐ Provided by Customer (Customer System Specific)

☐ Shared (Service Provider and Customer Responsibility)

☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,



AC-14 What is the solution and how is it implemented?

Part a




Part b






Download 1.2 Mb.

Share with your friends:
1   ...   69   70   71   72   73   74   75   76   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page