Joint task force transformation initiative


TABLE D-6: SUMMARY — SECURITY ASSESSMENT AND AUTHORIZATION CONTROLS



Download 5.8 Mb.
Page27/186
Date31.01.2017
Size5.8 Mb.
#13082
1   ...   23   24   25   26   27   28   29   30   ...   186


TABLE D-6: SUMMARY — SECURITY ASSESSMENT AND AUTHORIZATION CONTROLS

CNTL

NO.

control name

Control Enhancement Name

withdrawn

assurance

control baselines

low

mod

high

CA-1

Security Assessment and Authorization Policies and Procedures




x

x

x

x

CA-2

Security Assessments




x

x

x

x

CA-2(1)

security assessments | independent assessors




x




x

x

CA-2(2)

security assessments | specialized assessments




x







x

CA-2(3)

security assessments | external organizations




x










CA-3

System Interconnections




x

x

x

x

CA-3(1)

system interconnections | unclassified national security system connections
















CA-3(2)

system interconnections | classified national security system connections
















CA-3(3)

system interconnections | unclassified non-national security system connections
















CA-3(4)

system interconnections | connections to public networks
















CA-3(5)

system interconnections | restrictions on external system connections










x

x

CA-4

Security Certification

x

Incorporated into CA-2.

CA-5

Plan of Action and Milestones




x

x

x

x

CA-5(1)

plan of action and milestones | automation support for accuracy / currency




x










CA-6

Security Authorization




x

x

x

x

CA-7

Continuous Monitoring




x

x

x

x

CA-7(1)

continuous monitoring | independent assessment




x




x

x

CA-7(2)

continuous monitoring | types of assessments

x

Incorporated into CA-2.

CA-7(3)

continuous monitoring | trend analyses




x










CA-8

Penetration Testing




x







x

CA-8(1)

penetration testing | independent penetration agent or team




x










CA-8(2)

penetration testing | red team exercises




x










CA-9

Internal System Connections




x

x

x

x

CA-9(1)

internal system connections | security compliance checks




x













Directory: publications
publications -> Acm word Template for sig site
publications ->  Preparation of Papers for ieee transactions on medical imaging
publications -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
publications -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
publications -> Quantitative skills
publications -> Multi-core cpu and gpu implementation of Discrete Periodic Radon Transform and Its Inverse
publications -> List of Publications Department of Mechanical Engineering ucek, jntu kakinada
publications -> 1. 2 Authority 1 3 Planning Area 1
publications -> Sa michelson, 2011: Impact of Sea-Spray on the Atmospheric Surface Layer. Bound. Layer Meteor., 140 ( 3 ), 361-381, doi: 10. 1007/s10546-011-9617-1, issn: Jun-14, ids: 807TW, sep 2011 Bao, jw, cw fairall, sa michelson

Download 5.8 Mb.

Share with your friends:
1   ...   23   24   25   26   27   28   29   30   ...   186




The database is protected by copyright ©ininet.org 2024
send message

    Main page