Fedramp system Security Plan (ssp) High Baseline Template



Download 1.2 Mb.
Page4/478
Date16.12.2020
Size1.2 Mb.
#54609
1   2   3   4   5   6   7   8   9   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
9.4.Network Architecture 12

10.System Environment and Inventory 13

10.1.Data Flow 13

10.2.Ports, Protocols and Services 15

11.System Interconnections 16

12.Laws, Regulations, Standards and Guidance 19

12.1.Applicable Laws and Regulations 19

12.2.Applicable Standards and Guidance 19

13.Minimum Security Controls 20

13.1.Access Control (AC) 29

AC-1 Access Control Policy and Procedures Requirements (H) 29

AC-2 Account Management (H) 30

AC-2 (1) Control Enhancement (M) (H) 32

AC-2 (2) Control Enhancement (H) 32

AC-2 (3) Control Enhancement (H) 33

AC-2 (4) Control Enhancement (H) 34

AC-2 (5) Control Enhancement (H) 35

AC-2 (7) Control Enhancement (H) 36

AC-2 (9) Control Enhancement (H) 37

AC-2 (10) Control Enhancement (M) (H) 37

AC-2 (11) Control Enhancement (H) 38

AC-2 (12) Control Enhancement (H) 39

AC-2 (13) Control Enhancement (H) 40

AC-3 Access Enforcement (L) (M) (H) 41

AC-4 Information Flow Enforcement (M) (H) 41

AC-4 (8) Control Enhancement (H) 42

AC-4 (21) Control Enhancement (M) (H) 43

AC-5 Separation of Duties (M) (H) 44

AC-6 Least Privilege (M) (H) 45

AC-6 (1) Control Enhancement (H) 45

AC-6 (2) Control Enhancement (M) (H) 46

AC-6 (3) Control Enhancement (H) 47

AC 6 (5) Control Enhancement (M) (H) 48

AC-6 (7) Control Enhancement (H) 49

AC-6 (8) Control Enhancement (H) 50

AC-6 (9) Control Enhancement (M) (H) 50

AC-6 (10) Control Enhancement (M) (H) 51

AC-7 Unsuccessful Login Attempts (H) 52

AC-7 (2) Control Enhancement (H) 53

AC-8 System Use Notification (L) (M) (H) 53

AC-10 Concurrent Session Control (M) (H) 56

AC-11 Session Lock (M) (H) 57

AC-11 (1) Control Enhancement (M) (H) 58

AC-12 Session Termination (M) (H) 59

AC-12 (1) Control Enhancement (H) 59

AC-14 Permitted Actions without Identification or Authentication (L) (M) (H) 60

AC-17 Remote Access (L) (M) (H) 61

AC-17 (1) Control Enhancement (M) (H) 62

AC-17 (2) Control Enhancement (M) (H) 63

AC-17 (3) Control Enhancement (M) (H) 64

AC-17 (4) Control Enhancement (M) (H) 64

AC-17 (9) Control Enhancement (M) (H) 65

AC-18 Wireless Access Restrictions (L) (M) (H) 66

AC-18 (1) Control Enhancement (M) (H) 67

AC-18 (3) Control Enhancement (H) 67

AC-18 (4) Control Enhancement (H) 68

AC-18 (5) Control Enhancement (H) 69

AC-19 Access Control for Portable and Mobile Systems (L) (M) (H) 70

AC-19 (5) Control Enhancement (M) (H) 70

AC-20 Use of External Information Systems (L) (M) (H) 71

AC-20 (1) Control Enhancement (M) (H) 72

AC-20 (2) Control Enhancement (M) (H) 73

AC-21 Information Sharing (M) (H) 74

AC-22 Publicly Accessible Content (L) (M) (H) 75


Download 1.2 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page