SP 800-53Ar1 FPD Assessment Procedure Catalog, with SP 800-53r3 Security Controls
SECURITY ASSESSMENT AND AUTHORIZATION
CA-1
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
ASSESSMENT PROCEDURE
|
CA-1 |
SECURITY ASSESSMENT AND AUTHORIZATION POLICIES AND PROCEDURES
|
CA-1.1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policies and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security assessment and authorization responsibilities].
|
CA-1.2 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency of security assessment and authorization policy reviews/updates;
- (ii) the organization reviews/updates security assessment and authorization policy in accordance with organization-defined frequency;
- (iii) the organization defines the frequency of security assessment and authorization procedure reviews/updates; and
- (iv) the organization reviews/updates security assessment and authorization procedures in accordance with organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policies and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security assessment and authorization responsibilities].
|
CA-2
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
CA-2(2) |
SECURITY ASSESSMENTS
|
CA-2(2).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines:
- (ii) the organization conducts security control assessments using organization-defined forms of testing in accordance with organization-defined frequency and assessment techniques established for each form of testing.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing security assessments; security plan; security assessment plan; security assessment report; assessment evidence; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security assessment responsibilities].
|
CA-3
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
ASSESSMENT PROCEDURE
|
CA-3 |
INFORMATION SYSTEM CONNECTIONS
|
CA-3.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization identifies connections to external information systems (i.e., information systems outside of the authorization boundary);
- (ii) the organization authorizes connections from the information system to external information systems through the use of Interconnection Security Agreements;
- (iii) the organization documents, for each connection, the interface characteristics, security requirements, and the nature of the information communicated; and
- (iv) the organization monitors the information system connections on an ongoing basis to verify enforcement of security requirements.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Access control policy; procedures addressing information system connections; system and communications protection policy; information system interconnection security agreements; security plan; information system design documentation; security assessment report; plan of action and milestones; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements].
|
CA-3(1) |
INFORMATION SYSTEM CONNECTIONS
|
CA-3(1).1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Access control policy; procedures addressing information system connections; system and communications protection policy; information system interconnection security agreements; security plan; information system design documentation; security assessment report; plan of action and milestones; other relevant documents or records].
|
CA-3(2) |
INFORMATION SYSTEM CONNECTIONS
|
CA-3(2).1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Access control policy; procedures addressing information system connections; system and communications protection policy; information system interconnection agreements; security plan; information system design documentation;; security assessment report; plan of action and milestones; other relevant documents or records].
|
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
ASSESSMENT PROCEDURE
|
CA-4 |
SECURITY CERTIFICATION
[Withdrawn: Incorporated into CA-2].
|
CA-4.1 |
ASSESSMENT OBJECTIVE:
- [Withdrawn: Incorporated into CA-2].
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- [Withdrawn: Incorporated into CA-2].
|
CA-4(1) |
SECURITY CERTIFICATION
[Withdrawn: Incorporated into CA-2].
|
CA-4(1).1 |
ASSESSMENT OBJECTIVE:
- [Withdrawn: Incorporated into CA-2].
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- [Withdrawn: Incorporated into CA-2].
|
CA-5
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
CA-5(1) |
PLAN OF ACTION AND MILESTONES
|
CA-5(1).1 |
ASSESSMENT OBJECTIVE:
Determine if the organization employs automated mechanisms to help ensure that the plan of action and milestones for the information system is:
- accurate;
- up to date; and
- readily available.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing plan of action and milestones; information system design documentation, information system configuration settings and associated documentation; plan of action and milestones; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with plan of action and milestones development and implementation responsibilities].
- Test: [SELECT FROM: Automated mechanisms for developing, implementing and maintaining plan of action and milestones].
|
CA-6
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
CA-7
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
ASSESSMENT PROCEDURE
|
CA-7 |
CONTINUOUS MONITORING
|
CA-7.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization establishes a continuous monitoring strategy and program;
- (ii) the organization defines the frequency for reporting the security state of the information system to appropriate organizational officials;
- (iii) the organization defines organizational officials to whom the security state of the information system should be reported; and
- (iv) the organization implements a continuous monitoring program that includes:
- a configuration management process for the information system and its constituent components;
- a determination of the security impact of changes to the information system and environment of operation;
- ongoing security control assessments in accordance with the organizational continuous monitoring strategy; and
- reporting the security state of the information system to appropriate organizational officials in accordance with organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing continuous monitoring of information system security controls; procedures addressing configuration management; security plan; security assessment report; plan of action and milestones; information system monitoring records; configuration management records, security impact analyses; status reports; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with continuous monitoring responsibilities; organizational personnel with configuration management responsibilities].
|
CA-7(1) |
CONTINUOUS MONITORING
|
CA-7(1).1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing continuous monitoring of information system security controls; security plan; security assessment report; plan of action and milestones; information system monitoring records; security impact analyses; status reports; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with continuous monitoring responsibilities].
|
CA-7(2) |
CONTINUOUS MONITORING
|
CA-7(2).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines:
- (ii) the organization plans, schedules, and conducts assessments using organization-defined forms of security testing in accordance with the organization-defined frequency and assessment techniques established for each form of testing to ensure compliance with all vulnerability mitigation procedures.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing continuous monitoring of information system security controls; procedures addressing vulnerability mitigation; security plan; security assessment report; plan of action and milestones; information system monitoring records; security impact analyses; status reports; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with continuous monitoring responsibilities].
|
Source