Security Assessment and Authorization (CA) CA-1 – Security Assessment and Authorization Policies & Procedures
Program-specific policies and procedures shall be included in the specific security controls listed below. There is no requirement for the Program to develop additional policy to meet the -1 control.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Assesses the security controls in the information system and its environment of operation at least annually, or as stipulated in the organization's continuous monitoring program to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements
Click here to enter text.
Produces a security assessment report that documents the results of the assessment
Click here to enter text.
Provides the results of the security control assessment to the ISSP/SCA and the AO/AO REPRESENTATIVE
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
CA-2(1) – Security Assessments: Independent Assessors
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
CA-3 – Information System Connections
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated
Click here to enter text.
Reviews and updates Interconnection Security Agreements annually.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
CA-3(2) – Information System Connections: Classified National Security System Connections
After a relevance determination, this control can be tailored out for standalone IS and closed restricted networks.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
CA-3(5) – Information System Connections: Restrictions on External Network Connections
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
CA-5 – Plan of Action & Milestones
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Updates existing plan of action and milestones at least quarterly based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
Establishment of monitoring frequency for each security control.
Click here to enter text.
Ongoing security control assessments in accordance with the organizational continuous monitoring strategy.
Click here to enter text.
Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy.
Click here to enter text.
Correlation and analysis of security-related information generated by assessments and monitoring
Click here to enter text.
Response actions to address results of the analysis of security-related information
Reporting the security status of the organization and the information system to appropriate organizational officials at least annually, or whenever there is a significant change to the system or the environment in which the system operates
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
CA-9 – Internal System Connections
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Share with your friends: |