SSP Appendix A High FedRAMP Security Controls
SSP Appendix A High FedRAMP Security Controls
fedramp.gov
fedramp.gov 2
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
How to contact us
For questions about FedRAMP, or for questions about this document including how to use it,
contact [email protected].
Delete this Template Revision History page and all other instructional text from your final
version of this document.
fedramp.gov 3
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Instructions:
A cloud service provider (CSP) is encouraged to maintain the controls as a separate document
from the System Security Plan (SSP) as the size will impact the level of effort needed to
review/edit the SSP.
● The controls tables describe the security controls as they are implemented for the
system. For each control, it is important to describe how the control is implemented and
from where the control originates so that it is clear whose responsibility it is to
implement, manage, and monitor the control.
● Controls inheritance needs to be considered for each control – both from the perspective
of a CSP inheriting controls from another CSP and inheritability of controls from a CSP to
its customers (agencies or other CSPs). Please see the use case guidance, below:
o For controls that are inherited from another CSP, the inheriting CSP should
ensure that the “Inherited” box is selected with the name of the CSP being
inherited from and that the control solution description states what functionality is
being inherited from the other CSP.
▪ Note that “-1” controls (AC-1, AU-1, SC-1, etc.) are not 100% inherited;
the inheriting CSP must describe their functions to enable inheritance; in
some cases, the role may be minimal.
▪ Please remember that “inheritance” can be claimed from FedRAMP
Authorized services only. If a system or service is not FedRAMP
Authorized, a CSP is fully responsible for the control (though another
entity may perform its function).
o For controls defined as fully inheritable by the customer:
▪ A CSP is responsible for ensuring its implementation meets
federal/FedRAMP control requirements.
▪ A third-party assessment organization (3PAO) is required to validate that
inherited security features can be inherited.
fedramp.gov 4
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
o For a control that can only be inherited, under a specific use case:
▪ The CSP must describe that use case in the SSP.
▪ The 3PAO is required to validate the control inheritability (as dictated by
the use case).
o For controls defined as a customer responsibility, agencies are responsible for
implementing, documenting, and testing the control.
o For shared responsibility controls:
▪ Function(s), provided by a CSP, must be clearly documented in the SSP,
specifying a CSP’s responsibilities AND the responsibilities provided, or
configured by, their agency customer.
▪ A 3PAO is required to test a CSP’s responsibilities.
o For all controls, if a CSP provides options for an agency/customer, in
implementing a control, the CSP must make clear what options are compliant
with federal policy.
o A CSP is NOT responsible for having their agency customer’s implementation of
inherited controls tested.
o A CSP is NOT responsible for having customer-responsible controls tested.
● Throughout the controls, policies and procedures must be explicitly referenced (title and
date or version and the applicable section or paragraph numbers) so that it’s clear which
document is being referred to and where, within the document, applicable details can be
found.
Delete this instructional text from your final version of this document.
Instructions:
In the sections that follow, describe the information security control as it is implemented on the
system. All controls originate from a system or from a business process. It is important to
describe where the control originates from so that it is clear whose responsibility it is to
implement, manage, and monitor the control. In some cases, the responsibility is shared by a
CSP and by their customer. Use the definitions, in the table that follows, to indicate where each
security control originates from. Throughout this SSP, policies and procedures must be explicitly
referenced (title and date or version and the applicable section or paragraph numbers) so that it
fedramp.gov 5
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
is clear which document is being referred to. Section numbers, or similar mechanisms, should
allow the reviewer to easily find the reference.
For SaaS and PaaS systems, that are inheriting controls from an IaaS (or anything lower in the
stack), the “Inherited” check box must be checked, and the implementation description must
simply say “Inherited.” FedRAMP reviewers will determine whether the control-set is appropriate
or not.
The NIST term "Organization Defined" must be interpreted as being a CSP's responsibility
unless otherwise indicated. In some cases, the JAB has chosen to define or provide
parameters, and in others, they have left the decision up to CSPs.
Please note: CSPs should not modify the control requirement text, including the parameter
assignment instructions and additional FedRAMP requirements. CSP responses must be
documented in the “Control Summary Information” and “What is the solution and how is it
implemented?” tables.
Delete this instructional text from your final version of this document.
The definitions in Table A-1. Control Origination and Definitions indicate where each security
control originates.
Table A-1. Control Origination and Definitions
Service Provider A control that originates from a DNS, from the corporate network, provides
Corporate CSP’s corporate network. address resolution services for the information
system and the service offering.
Service Provider A control specific to a particular A unique host-based intrusion detection system
System Specific CSP system and the control is (HIDs) is available on the service offering
not part of the standard platform but is not available on the corporate
corporate controls. network.
fedramp.gov 6
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Service Provider A control that makes use of both There are scans of the corporate network
Hybrid corporate controls and infrastructure; scans of databases and web-
additional controls specific to a based applications are system specific.
particular system.
Provided by A control where the customer The customer provides a SAML SSO solution to
Customer needs to provide additional implement two-factor authentication.
hardware or software to meet
the control requirement.
Shared A control that is managed and Security awareness training must be conducted
implemented partially by a CSP by both the CSPN and the customer.
and partially by their customer.
Inherited from A control that is inherited from A PaaS or SaaS provider inherits PE controls
pre-existing another CSP system that has from an IaaS provider.
FedRAMP already received a FedRAMP
Authorization authorization.
Responsible role indicates the role of a CSP employee who can best respond to questions
about the particular control that is described.
fedramp.gov 7
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
TABLE OF CONTENTS
Access Control..........................................................................................................................25
fedramp.gov 8
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 9
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 10
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 11
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Configuration Management....................................................................................................150
fedramp.gov 12
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Contingency Planning.............................................................................................................194
fedramp.gov 13
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 14
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 15
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Incident Response...................................................................................................................273
fedramp.gov 16
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Maintenance.............................................................................................................................303
Media Protection......................................................................................................................319
fedramp.gov 17
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 18
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planning....................................................................................................................................364
Personnel Security..................................................................................................................375
fedramp.gov 19
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Risk Assessment.....................................................................................................................390
fedramp.gov 20
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 21
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 22
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
SI-2(3) Time to Remediate Flaws and Benchmarks for Corrective Actions (M)(H)...........492
fedramp.gov 23
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 24
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 25
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Access Control
2. Procedures to facilitate the implementation of the access control policy and the
associated access controls;
Responsible Role:
Parameter AC-1(a):
Parameter AC-1(a)(1):
fedramp.gov 26
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter AC-1(b):
Parameter AC-1(c)(1)-1:
Parameter AC-1(c)(1)-2:
Parameter AC-1(c)(2)-1:
Parameter AC-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 27
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Require [Assignment: organization-defined prerequisites and criteria] for group and role
membership;
d. Specify:
fedramp.gov 28
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(c):
Parameter AC-2(d)(3):
Parameter AC-2(e):
Parameter AC-2(f):
Parameter AC-2(h):
Parameter AC-2(h)(1):
Parameter AC-2(h)(2):
Parameter AC-2(h)(3):
Parameter AC-2(i)(3):
Parameter AC-2(j):
fedramp.gov 29
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
Part h:
Part i:
Part j:
Part k:
Part l:
fedramp.gov 30
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(1):
fedramp.gov 31
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(2)-1:
Parameter AC-2(2)-2:
fedramp.gov 32
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
a. Have expired;
d. Have been inactive for [FedRAMP Assignment: thirty-five (35) days (See additional
requirements and guidance.)].
Guidance: For DoD clouds, see DoD cloud website for specific DoD requirements
that go above and beyond FedRAMP https://public.cyber.mil/dccs/.
Requirement: The service provider defines the time period for non-user accounts
(e.g., accounts associated with devices). The time periods are approved and
accepted by the JAB/AO. Where user management is a function of the service,
reports of activity of consumer users shall be made available.
(d) Requirement: The service provider defines the time period of inactivity for
device identifiers.
Responsible Role:
Parameter AC-2(3):
Parameter AC-2(3)(d):
fedramp.gov 33
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Responsible Role:
fedramp.gov 34
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(5):
fedramp.gov 35
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
(d) Revoke access when privileged role or attribute assignments are no longer
appropriate.
Responsible Role:
Parameter AC-2(7)(a):
fedramp.gov 36
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
fedramp.gov 37
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(9):
fedramp.gov 38
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(11)-1:
Parameter AC-2(11)-2:
fedramp.gov 39
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-2(12)(a):
Parameter AC-2(12)(b):
fedramp.gov 40
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter AC-2(13)-1:
Parameter AC-2(13)-2:
fedramp.gov 41
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Responsible Role:
fedramp.gov 42
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-4:
fedramp.gov 43
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Requirement: The service provider must support Agency requirements to comply with
M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-
the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-
Cybersecurity-Incidents.pdf) and M-22-09
(https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf).
Responsible Role:
Parameter AC-4(4)-1:
Parameter AC-4(4)-2:
fedramp.gov 44
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-4(21)-1:
Parameter AC-4(21)-2:
fedramp.gov 45
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Responsible Role:
Parameter AC-5(a):
fedramp.gov 46
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
fedramp.gov 47
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 48
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-6(1):
Parameter AC-6(1)(a):
Parameter AC-6(1)(b):
Part a:
Part b:
fedramp.gov 49
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Examples of security functions include but are not limited to: establishing
system accounts, configuring access authorizations (i.e., permissions, privileges), setting
events to be audited, and setting intrusion detection parameters, system programming,
system and security administration, other privileged functions.
Responsible Role:
Parameter AC-6(2):
fedramp.gov 50
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-6(3)-1:
Parameter AC-6(3)-2:
fedramp.gov 51
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Responsible Role:
Parameter AC-6(5):
fedramp.gov 52
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Responsible Role:
Parameter AC-6(7)(a)-1:
Parameter AC-6(7)(a)-2:
fedramp.gov 53
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter AC-6(8):
fedramp.gov 54
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 55
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 56
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-7(a)-1:
Parameter AC-7(a)-2:
Parameter AC-7(b):
fedramp.gov 57
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
fedramp.gov 58
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
3. Unauthorized use of the system is prohibited and subject to criminal and civil
penalties; and
b. Retain the notification message or banner on the screen until users acknowledge the
usage conditions and take explicit actions to log on to or further access the system; and
Requirement: The service provider shall determine how System Use Notification
is going to be verified and provide appropriate periodicity of the check. The System
Use Notification verification and periodicity are approved and accepted by the
JAB/AO.
fedramp.gov 59
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-8(a):
Parameter AC-8(c)(1):
Part a:
Part b:
Part c:
fedramp.gov 60
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-10-1:
Parameter AC-10-2:
fedramp.gov 61
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Retain the device lock until the user re-establishes access using established
identification and authentication procedures.
Responsible Role:
Parameter AC-11(a):
fedramp.gov 62
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Part a:
Part b:
Responsible Role:
fedramp.gov 63
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Responsible Role:
Parameter AC-12:
fedramp.gov 64
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
b. Document and provide supporting rationale in the security plan for the system, user
actions not requiring identification or authentication.
Responsible Role:
Parameter AC-14(a):
fedramp.gov 65
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Authorize each type of remote access to the system prior to allowing such connections.
Responsible Role:
fedramp.gov 66
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 67
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 68
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 69
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(b) Document the rationale for remote access in the security plan for the system.
Responsible Role:
Parameter AC-17(4)(a):
fedramp.gov 70
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Authorize each type of wireless access to the system prior to allowing such connections.
Responsible Role:
fedramp.gov 71
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter AC-18(1):
fedramp.gov 72
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 73
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 74
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 75
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 76
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter AC-19(5)-1:
Parameter AC-19(5)-2:
fedramp.gov 77
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
fedramp.gov 78
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: The interrelated controls of AC-20, CA-3, and SA-9 should be differentiated
as follows:
Responsible Role:
Parameter AC-20(a):
Parameter AC-20(b):
fedramp.gov 79
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 80
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter AC-20(2):
fedramp.gov 81
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AC-21(a):
Parameter AC-21(b):
fedramp.gov 82
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Part a:
Part b:
b. Train authorized individuals to ensure that publicly accessible information does not
contain nonpublic information;
c. Review the proposed content of information prior to posting onto the publicly accessible
system to ensure that nonpublic information is not included; and
d. Review the content on the publicly accessible system for nonpublic information
[FedRAMP Assignment: at least quarterly] and remove such information, if discovered.
Responsible Role:
fedramp.gov 83
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter AC-22(d):
Part a:
Part b:
Part c:
Part d:
fedramp.gov 84
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AT-1(a):
Parameter AT-1(a)(1):
Parameter AT-1(b):
fedramp.gov 85
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter AT-1(c)(1)-1:
Parameter AT-1(c)(1)-2:
Parameter AT-1(c)(2)-1:
Parameter AT-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 86
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
1. As part of initial training for new users and [FedRAMP Assignment: at least
annually] thereafter; and
b. Employ the following techniques to increase the security and privacy awareness of
system users [Assignment: organization-defined awareness techniques];
d. Incorporate lessons learned from internal or external security or privacy incidents into
literacy training and awareness techniques.
Responsible Role:
Parameter AT-2(a)(1):
Parameter AT-2(a)(2):
Parameter AT-2(b):
Parameter AT-2(c)-1:
Parameter AT-2(c)-2:
fedramp.gov 87
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Responsible Role:
fedramp.gov 88
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 89
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Incorporate lessons learned from internal or external security or privacy incidents into
role-based training.
Responsible Role:
Parameter AT-3(a):
fedramp.gov 90
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter AT-3(a)(1):
Parameter AT-3(b)-1:
Parameter AT-3(b)-2:
Part a:
Part b:
Part c:
fedramp.gov 91
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Retain individual training records for [FedRAMP Assignment: five (5) years or 5 years
after completion of a specific training program].
Responsible Role:
Parameter AT-4(b):
fedramp.gov 92
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
fedramp.gov 93
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-1(a):
Parameter AU-1(a)(1):
Parameter AU-1(b):
Parameter AU-1(c)(1)-1:
Parameter AU-1(c)(1)-2:
Parameter AU-1(c)(2)-1:
Parameter AU-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 94
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Coordinate the event logging function with other organizational entities requiring audit-
related information to guide and inform the selection criteria for events to be logged;
c. Specify the following event types for logging within the system: [FedRAMP Assignment:
organization-defined subset of the auditable events defined in AU-2a to be audited
continually for each identified event.];
d. Provide a rationale for why the event types selected for logging are deemed to be
adequate to support after-the-fact investigations of incidents; and
e. Review and update the event types selected for logging [FedRAMP Assignment:
annually and whenever there is a change in the threat environment].
Responsible Role:
Parameter AU-2(a):
Parameter AU-2(c):
Parameter AU-2(e):
fedramp.gov 95
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
fedramp.gov 96
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Part a:
fedramp.gov 97
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part b:
Part c:
Part d:
Part e:
Part f:
Guidance: For client-server transactions, the number of bytes sent and received gives
bidirectional transfer information that can be helpful during an investigation or inquiry.
Responsible Role:
Parameter AU-3(1):
fedramp.gov 98
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-4:
fedramp.gov 99
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Take the following additional actions: [FedRAMP Assignment: overwrite oldest record].
Responsible Role:
Parameter AU-5(a)-1:
Parameter AU-5(a)-2:
Parameter AU-5(b):
fedramp.gov 100
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
Parameter AU-5(1)-1:
fedramp.gov 101
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter AU-5(1)-2:
Parameter AU-5(1)-3:
fedramp.gov 102
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-5(2)-1:
Parameter AU-5(2)-2:
Parameter AU-5(2)-3:
fedramp.gov 103
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Adjust the level of audit record review, analysis, and reporting within the system when
there is a change in risk based on law enforcement information, intelligence information,
or other credible sources of information.
Responsible Role:
Parameter AU-6(a)-1:
Parameter AU-6(a)-2:
Parameter AU-6(b):
fedramp.gov 104
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter AU-6(1):
fedramp.gov 105
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 106
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 107
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-6(5):
fedramp.gov 108
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 109
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Responsible Role:
Parameter AU-6(7):
fedramp.gov 110
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
a. Supports on-demand audit record review, analysis, and reporting requirements and
after-the-fact investigations of incidents; and
b. Does not alter the original content or time ordering of audit records.
Responsible Role:
fedramp.gov 111
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
Parameter AU-7(1):
fedramp.gov 112
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Record time stamps for audit records that meet [FedRAMP Assignment: one second
granularity of time measurement] and that use Coordinated Universal Time, have a fixed
local time offset from Coordinated Universal Time, or that include the local time offset as
part of the time stamp.
fedramp.gov 113
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-8(b):
Part a:
Part b:
fedramp.gov 114
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-9(b):
fedramp.gov 115
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter AU-9(2):
fedramp.gov 116
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Note that this enhancement requires the use of cryptography which must be
compliant with Federal requirements and utilize FIPS validated or NSA approved
cryptography (see SC-13.)
Responsible Role:
fedramp.gov 117
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Responsible Role:
Parameter AU-9(4):
fedramp.gov 118
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Responsible Role:
Parameter AU-10:
fedramp.gov 119
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: The service provider is encouraged to align with M-21-31 where possible.
Requirement: The service provider retains audit records online for at least ninety (90)
days and further preserves audit records off-line for a period that is in accordance with
NARA requirements.
Requirement: The service provider must support Agency requirements to comply with
M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-
the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-
Cybersecurity-Incidents.pdf)
Responsible Role:
Parameter AU-11:
fedramp.gov 120
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
c. Generate audit records for the event types defined in AU-2c that include the audit record
content defined in AU-3.
Responsible Role:
fedramp.gov 121
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter AU-12(a):
Parameter AU-12(b):
Part a:
Part b:
Part c:
fedramp.gov 122
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-12(1)-1:
Parameter AU-12(1)-2:
fedramp.gov 123
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter AU-12(3)-1:
Parameter AU-12(3)-2:
Parameter AU-12(3)-3:
Parameter AU-12(3)-4:
fedramp.gov 124
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 125
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CA-1(a):
Parameter CA-1(a)(1):
Parameter CA-1(b):
Parameter CA-1(c)(1)-1:
Parameter CA-1(c)(1)-2:
Parameter CA-1(c)(2)-1:
Parameter CA-1(c)(2)-2:
fedramp.gov 126
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
b. Develop a control assessment plan that describes the scope of the assessment
including:
c. Ensure the control assessment plan is reviewed and approved by the authorizing official
or designated representative prior to conducting the assessment;
d. Assess the controls in the system and its environment of operation [FedRAMP
Assignment: at least annually] to determine the extent to which the controls are
implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting established security and privacy
e. Produce a control assessment report that document the results of the assessment; and
fedramp.gov 127
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CA-2(d):
Parameter CA-2(f):
Part a:
Part b:
Part c:
Part d:
Part e:
fedramp.gov 128
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part f:
Responsible Role:
fedramp.gov 129
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CA-2(2)-1:
Parameter CA-2(2)-2:
Parameter CA-2(2)-3:
fedramp.gov 130
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CA-2(3)-1:
Parameter CA-2(3)-2:
Parameter CA-2(3)-3:
fedramp.gov 131
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Review and update the agreements [FedRAMP Assignment: at least annually and on
input from JAB/AO].
Responsible Role:
Parameter CA-3(a):
fedramp.gov 132
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CA-3(c):
Part a:
Part b:
Part c:
fedramp.gov 133
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 134
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Update existing plan of action and milestones [FedRAMP Assignment: at least monthly]
based on the findings from control assessments, independent audits or reviews, and
continuous monitoring activities.
Responsible Role:
Parameter CA-5(b):
fedramp.gov 135
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Assign a senior official as the authorizing official for common controls available for
inheritance by organizational systems;
c. Ensure that the authorizing official for the system, before commencing operations:
d. Ensure that the authorizing official for common controls authorizes the use of those
controls for inheritance by organizational systems; and
Responsible Role:
Parameter CA-6(e):
fedramp.gov 136
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
fedramp.gov 137
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
g. Reporting the security and privacy status of the system to [FedRAMP Assignment: to
include JAB/AO].[Assignment: organization-defined frequency]
Guidance: FedRAMP does not provide a template for the Continuous Monitoring Plan.
CSPs should reference the FedRAMP Continuous Monitoring Strategy Guide when
developing the Continuous Monitoring Plan.
Requirement: CSOs with more than one agency ATO must implement a collaborative
Continuous Monitoring (ConMon) approach described in the FedRAMP Guide for Multi-
Agency Continuous Monitoring. This requirement applies to CSOs authorized via the
Agency path as each agency customer is responsible for performing ConMon oversight.
It does not apply to CSOs authorized via the JAB path because the JAB performs
ConMon oversight.
Responsible Role:
Parameter CA-7(a):
fedramp.gov 138
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CA-7(b)-1:
Parameter CA-7(b)-2:
Parameter CA-7(g)-1:
Parameter CA-7(g)-2:
Part a:
Part b:
Part c:
Part d:
fedramp.gov 139
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part e:
Part f:
Part g:
Responsible Role:
fedramp.gov 140
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 141
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Part a:
Part b:
Part c:
Responsible Role:
Parameter CA-8-1:
Parameter CA-8-2:
fedramp.gov 142
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 143
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: See the FedRAMP Documents page > Penetration Test Guidance
https://www.FedRAMP.gov/documents/
Responsible Role:
Parameter CA-8(2):
fedramp.gov 144
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
b. Document, for each internal connection, the interface characteristics, security and
privacy requirements, and the nature of the information communicated;
d. Review [FedRAMP Assignment: at least annually] the continued need for each internal
connection.
Responsible Role:
fedramp.gov 145
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CA-9(a):
Parameter CA-9(c):
Parameter CA-9(d):
Part a:
Part b:
Part c:
Part d:
fedramp.gov 146
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Configuration Management
Responsible Role:
Parameter CM-1(a):
Parameter CM-1(a)(1):
Parameter CM-1(b):
fedramp.gov 147
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CM-1(c)(1)-1:
Parameter CM-1(c)(1)-2:
Parameter CM-1(c)(2)-1:
Parameter CM-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 148
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-2(b)(1):
Parameter CM-2(b)(2):
fedramp.gov 149
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text] Date of
Authorization
Part a:
Part b:
Responsible Role:
Parameter CM-2(2):
fedramp.gov 150
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-2(3):
fedramp.gov 151
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(b) Apply the following controls to the systems or components when the individuals
return from travel: [Assignment: organization-defined controls].
Responsible Role:
Parameter CM-2(7)(a)-1:
Parameter CM-2(7)(a)-2:
Parameter CM-2(7)(b):
fedramp.gov 152
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
fedramp.gov 153
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
g. Coordinate and provide oversight for configuration change control activities through
[Assignment: organization-defined configuration change control element] that convenes
[Selection (one-or-more): organization-defined frequency; when [Assignment:
organization-defined configuration change conditions]].
Responsible Role:
Parameter CM-3(e):
Parameter CM-3(g)-1:
Parameter CM-3(g)-2:
fedramp.gov 154
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
(c) Highlight proposed changes to the system that have not been approved or
disapproved within [FedRAMP Assignment: organization agreed upon time period];
(d) Prohibit changes to the system until designated approvals are received;
fedramp.gov 155
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-3(1):
Parameter CM-3(1)(b):
Parameter CM-3(1)(c):
Parameter CM-3(1)(f):
fedramp.gov 156
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Responsible Role:
fedramp.gov 157
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-3(4)-1:
Parameter CM-3(4)-2:
fedramp.gov 158
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-3(6):
fedramp.gov 159
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 160
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 161
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 162
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 163
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-5(1)(a):
fedramp.gov 164
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter CM-5(5)(b):
fedramp.gov 165
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
c. Identify, document, and approve any deviations from established configuration settings
for [Assignment: organization-defined system components] based on [Assignment:
organization-defined operational requirements]; and
Guidance: Compliance checks are used to evaluate configuration settings and provide
general insight into the overall effectiveness of configuration management activities.
fedramp.gov 166
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
CSPs and 3PAOs typically combine compliance check findings into a single CM-6
finding, which is acceptable. However, for initial assessments, annual assessments, and
significant change requests, FedRAMP requires a clear understanding, on a per-control
basis, where risks exist. Therefore, 3PAOs must also analyze compliance check
findings as part of the controls assessment. Where a direct mapping exists, the 3PAO
must document additional findings per control in the corresponding SAR Risk Exposure
Table (RET), which are then documented in the CSP’s Plan of Action and Milestones
(POA&M). This will likely result in the details of individual control findings overlapping
with those in the combined CM-6 finding, which is acceptable.
During monthly continuous monitoring, new findings from CSP compliance checks may
be combined into a single CM-6 POA&M item. CSPs are not required to map the
findings to specific controls because controls are only assessed during initial
assessments, annual assessments, and significant change requests.
(a) Requirement 1: The service provider shall use the DoD STIGs to establish
configuration settings; Center for Internet Security up to Level 2 (CIS Level 2) guidelines
shall be used if STIGs are not available; Custom baselines shall be used if CIS is not
available.
(a) Requirement 2: The service provider shall ensure that checklists for configuration
settings are Security Content Automation Protocol (SCAP) validated or SCAP
compatible (if validated checklists are not available).
Responsible Role:
Parameter CM-6(a):
Parameter CM-6(c)-1:
Parameter CM-6(c)-2:
fedramp.gov 167
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Responsible Role:
Parameter CM-6(1)-1:
Parameter CM-6(1)-2:
fedramp.gov 168
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 169
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CM-6(2)-1:
Parameter CM-6(2)-2:
fedramp.gov 170
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or
services: [Assignment: organization-defined prohibited or restricted functions, system
ports, protocols, software, and/or services].
(b) Requirement: The service provider shall use Security guidelines (See CM-6) to
establish list of prohibited or restricted functions, ports, protocols, and/or services or
establishes its own list of prohibited or restricted functions, ports, protocols, and/or
services if STIGs or CIS is not available.
Responsible Role:
Parameter CM-7(a):
Parameter CM-7(b):
fedramp.gov 171
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter CM-7(1)(a):
Parameter CM-7(1)(b):
fedramp.gov 172
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Guidance: This control refers to software deployment by CSP personnel into the
production environment. The control requires a policy that states conditions for deploying
software. This control shall be implemented in a technical manner on the information
system to only allow programs to run that adhere to the policy (i.e. allow-listing). This
control is not to be based off of strictly written policy on what is allowed or not allowed to
run.
Responsible Role:
Parameter CM-7(2):
fedramp.gov 173
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
(c) Review and update the list of authorized software programs [FedRAMP
Assignment: at least quarterly or when there is a change].
fedramp.gov 174
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-7(5)(a):
Parameter CM-7(5)(c):
Part a:
Part b:
Part c:
fedramp.gov 175
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
4. Is at the level of granularity deemed necessary for tracking and reporting; and
b. Review and update the system component inventory [FedRAMP Assignment: at least
monthly].
Responsible Role:
Parameter CM-8(a)(5):
Parameter CM-8(b):
fedramp.gov 176
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 177
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-8(2):
fedramp.gov 178
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(b) Take the following actions when unauthorized components are detected:
[Selection (one-or-more): disable network access by such components; isolate the
components; notify [Assignment: organization-defined personnel or roles]].
Responsible Role:
Parameter CM-8(3)(a)-1:
Parameter CM-8(3)(a)-2:
Parameter CM-8(3)(b):
fedramp.gov 179
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
Parameter CM-8(4):
fedramp.gov 180
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 181
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Defines the configuration items for the system and places the configuration items under
configuration management;
Guidance: FedRAMP does not provide a template for the Configuration Management
Plan. However, NIST SP 800-128, Guide for Security-Focused Configuration
Management of Information Systems, provides guidelines for the implementation of CM
controls as well as a sample CMP outline in Appendix D of the Guide.
Responsible Role:
Parameter CM-9(d):
fedramp.gov 182
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Part a:
Part b:
Part c:
Part d:
Part e:
b. Track the use of software and associated documentation protected by quantity licenses
to control copying and distribution; and
c. Control and document the use of peer-to-peer file sharing technology to ensure that this
capability is not used for the unauthorized distribution, display, performance, or
reproduction of copyrighted work.
Responsible Role:
fedramp.gov 183
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Part a:
Part b:
Part c:
Responsible Role:
Parameter CM-11(a):
fedramp.gov 184
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CM-11(b):
Parameter CM-11(c):
Part a:
Part b:
Part c:
fedramp.gov 185
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Identify and document the users who have access to the system and system
components where the information is processed and stored; and
c. Document changes to the location (i.e., system or system components) where the
information is processed and stored.
Responsible Role:
Parameter CM-12(a):
fedramp.gov 186
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Part a:
Part b:
Part c:
Responsible Role:
Parameter CM-12(1)-1:
Parameter CM-12(1)-2:
fedramp.gov 187
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CM-14:
fedramp.gov 188
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Contingency Planning
fedramp.gov 189
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-1(a):
Parameter CP-1(a)(1):
Parameter CP-1(b):
Parameter CP-1(c)(1)-1:
Parameter CP-1(c)(1)-2:
Parameter CP-1(c)(2)-1:
Parameter CP-1(c)(2)-2:
fedramp.gov 190
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
fedramp.gov 191
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
d. Review the contingency plan for the system [FedRAMP Assignment: at least annually];
Requirement: CSPs must use the FedRAMP Information System Contingency Plan
(ISCP) Template (available on the fedramp.gov:
https://www.fedramp.gov/assets/resources/templates/SSP-Appendix-G-Information-
System-Contingency-Plan-(ISCP)-Template.docx).
Responsible Role:
Parameter CP-2(a)(7):
Parameter CP-2(b):
Parameter CP-2(d):
fedramp.gov 192
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter CP-2(f):
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
fedramp.gov 193
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part h:
Responsible Role:
fedramp.gov 194
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 195
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-2(3)-1:
Parameter CP-2(3)-2:
fedramp.gov 196
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-2(5):
fedramp.gov 197
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-2(8):
fedramp.gov 198
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(a) Requirement: Privileged admins and engineers must take the basic contingency
training within 10 days. Consideration must be given for those privileged admins and
engineers with critical contingency-related roles, to gain enough system context and
situational awareness to understand the full impact of contingency training as it applies
to their respective level. Newly hired critical contingency personnel must take this more
in-depth training within 60 days of hire date when the training will have more impact.
Responsible Role:
Parameter CP-3(a)(1):
Parameter CP-3(a)(3):
Parameter CP-3(b)-1:
Parameter CP-3(b)-2:
fedramp.gov 199
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
fedramp.gov 200
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 201
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(a) Requirement: The service provider develops test plans in accordance with NIST
Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to
initiating testing.
(a) Requirement: The service provider must include the Contingency Plan test results
with the security package within the Contingency Plan-designated appendix (Appendix
G, Contingency Plan Test Report).
Responsible Role:
Parameter CP-4(a)-1:
Parameter CP-4(a)-2:
fedramp.gov 202
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
fedramp.gov 203
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(a) To familiarize contingency personnel with the facility and available resources; and
(b) To evaluate the capabilities of the alternate processing site to support contingency
operations.
Responsible Role:
fedramp.gov 204
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Ensure that the alternate storage site provides controls equivalent to that of the primary
site.
Responsible Role:
fedramp.gov 205
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 206
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 207
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Responsible Role:
fedramp.gov 208
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
b. Make available at the alternate processing site, the equipment and supplies required to
transfer and resume operations or put contracts in place to support delivery to the site
within the organization-defined time period for transfer and resumption; and
c. Provide controls at the alternate processing site that are equivalent to those at the
primary site.
(a) Requirement: The service provider defines a time period consistent with the
recovery time objectives and business impact analysis.
Responsible Role:
Parameter CP-7(a)-1:
Parameter CP-7(a)-2:
fedramp.gov 209
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Guidance: The service provider may determine what is considered a sufficient degree of
separation between the primary and alternate processing sites, based on the types of
threats that are of concern. For one particular type of threat (i.e., hostile cyber attack),
the degree of separation between sites will be less relevant.
fedramp.gov 210
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 211
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Responsible Role:
fedramp.gov 212
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 213
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Requirement: The service provider defines a time period consistent with the recovery
time objectives and business impact analysis.
fedramp.gov 214
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-8-1:
Parameter CP-8-2:
fedramp.gov 215
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 216
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 217
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 218
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(b) Review provider contingency plans to ensure that the plans meet organizational
contingency requirements; and
Responsible Role:
Parameter CP-8(4)(c):
fedramp.gov 219
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Requirement: The service provider shall determine what elements of the cloud
environment require the Information System Backup control. The service provider shall
determine how Information System Backup is going to be verified and appropriate
periodicity of the check.
(a) Requirement: The service provider maintains at least three (3) backup copies of
user-level information (at least one (1) of which is available online) or provides an
equivalent alternative.
(b) Requirement: The service provider maintains at least three (3) backup copies of
system-level information (at least one (1) of which is available online) or provides an
equivalent alternative.
(c) Requirement: The service provider maintains at least three (3) backup copies of
information system documentation including security information (at least one (1) of
which is available online) or provides an equivalent alternative.
fedramp.gov 220
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-9(a)-1:
Parameter CP-9(a)-2:
Parameter CP-9(b):
Parameter CP-9(c):
Part a:
Part b:
fedramp.gov 221
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part c:
Part d:
Responsible Role:
Parameter CP-9(1):
fedramp.gov 222
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 223
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-9(3):
fedramp.gov 224
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-9(5):
fedramp.gov 225
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Note that this enhancement requires the use of cryptography which must be
compliant with Federal requirements and utilize FIPS validated or NSA approved
cryptography (see SC-13.)
Responsible Role:
Parameter CP-9(8):
fedramp.gov 226
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter CP-10:
fedramp.gov 227
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 228
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Responsible Role:
Parameter CP-10(4):
fedramp.gov 229
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
fedramp.gov 230
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-1(a):
Parameter IA-1(a)(1):
Parameter IA-1(b):
Parameter IA-1(c)(1)-1:
Parameter IA-1(c)(1)-2:
Parameter IA-1(c)(2)-1:
Parameter IA-1(c)(2)-2:
fedramp.gov 231
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Requirement: For all control enhancements that specify multifactor authentication, the
implementation must adhere to the Digital Identity Guidelines specified in NIST Special
Publication 800-63B.
Requirement: All uses of encrypted virtual private networks must meet all applicable
Federal requirements and architecture, dataflow, and security and privacy controls must
be documented, assessed, and authorized to operate.
Responsible Role:
fedramp.gov 232
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
fedramp.gov 233
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 234
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 235
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 236
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(a) One of the factors is provided by a device separate from the system gaining
access; and
Responsible Role:
Parameter IA-2(6)-1:
Parameter IA-2(6)-2:
Parameter IA-2(6)(b):
fedramp.gov 237
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter IA-2(8):
fedramp.gov 238
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Include Common Access Card (CAC), i.e., the DoD technical implementation
of PIV/FIPS 201/HSPD-12.
Responsible Role:
fedramp.gov 239
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-3-1:
Parameter IA-3-2:
fedramp.gov 240
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
a. Receiving authorization from [FedRAMP Assignment: at a minimum, the ISSO (or similar
role within the organization)] to assign an individual, group, role, service, or device
identifier;
c. Assigning the identifier to the intended individual, group, role, service, or device; and
d. Preventing reuse of identifiers for [FedRAMP Assignment: at least two (2) years].
Responsible Role:
Parameter IA-4(a):
fedramp.gov 241
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter IA-4(d):
Part a:
Part b:
Part c:
Part d:
fedramp.gov 242
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-4(4):
fedramp.gov 243
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
a. Verifying, as part of the initial authenticator distribution, the identity of the individual,
group, role, service, or device receiving the authenticator;
c. Ensuring that authenticators have sufficient strength of mechanism for their intended
use;
h. Requiring individuals to take, and having devices implement, specific controls to protect
authenticators; and
i. Changing authenticators for group or role accounts when membership to those accounts
changes.
Responsible Role:
fedramp.gov 244
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter IA-5(f)-1:
Parameter IA-5(f)-2:
Part a:
Part b:
Part c:
Part d:
Part e:
fedramp.gov 245
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part f:
Part g:
Part h:
Part i:
(b) Verify, when users create or update passwords, that the passwords are not found
on the list of commonly-used, expected, or compromised passwords in IA-5(1)(a);
(d) Store passwords using an approved salted key derivation function, preferably
using a keyed hash;
(f) Allow user selection of long passwords and passphrases, including spaces and all
printable characters;
(g) Employ automated tools to assist the user in selecting strong password
authenticators; and
Guidance: Note that (c) and (d) require the use of cryptography which must be
compliant with Federal requirements and utilize FIPS validated or NSA approved
cryptography (see SC-13).
fedramp.gov 246
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: Password policies must be compliant with NIST SP 800-63B for all
memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password
policies shall not enforce special character or minimum password rotation
requirements for memorized secrets of users.
For emergency use accounts, these rules should be enforced: must have a
minimum length of 14 characters, must support all printable ASCII characters, and
passwords must be changed if used.
Responsible Role:
Parameter IA-5(1)(a):
Parameter IA-5(1)(h):
fedramp.gov 247
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
Part h:
(2) Map the authenticated identity to the account of the individual or group; and
(2) Implement a local cache of revocation data to support path discovery and
validation.
Responsible Role:
fedramp.gov 248
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 249
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: In this context, prohibited static storage refers to any storage where
unencrypted authenticators, such as passwords, persist beyond the time required to
complete the access process.
fedramp.gov 250
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 251
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-5(8):
fedramp.gov 252
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-5(13):
fedramp.gov 253
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 254
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 255
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 256
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 257
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Part a:
Part b:
fedramp.gov 258
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-8(4):
fedramp.gov 259
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: The fixed time period cannot exceed the limits set in SP 800-63. At this time
they are:
Responsible Role:
Parameter IA-11:
fedramp.gov 260
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 261
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
fedramp.gov 262
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-12(3):
fedramp.gov 263
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 264
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IA-12(5):
fedramp.gov 265
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Incident Response
2. Procedures to facilitate the implementation of the incident response policy and the
associated incident response controls;
fedramp.gov 266
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-1(a):
Parameter IR-1(a)(1):
Parameter IR-1(b):
Parameter IR-1(c)(1)-1:
Parameter IR-1(c)(1)-2:
Parameter IR-1(c)(2)-1:
Parameter IR-1(c)(2)-2:
fedramp.gov 267
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
1. Within [FedRAMP Assignment: ten (10) days for privileged users, thirty (30) days
for Incident Response roles] of assuming an incident response role or
responsibility or acquiring system access;
b. Review and update incident response training content [FedRAMP Assignment: at least
annually] and following [Assignment: organization-defined events].
Responsible Role:
Parameter IR-2(a)(1):
Parameter IR-2(a)(3):
Parameter IR-2(b)-1:
Parameter IR-2(b)-2:
fedramp.gov 268
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
fedramp.gov 269
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
fedramp.gov 270
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-2(2):
fedramp.gov 271
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: The service provider defines tests and/or exercises in accordance with
NIST Special Publication 800-61 (as amended). Functional testing must occur prior to
testing for initial authorization. Annual functional testing may be concurrent with required
penetration tests (see CA-8). The service provider provides test plans to the JAB/AO
annually. Test plans are approved and accepted by the JAB/AO prior to test
commencing.
Responsible Role:
Parameter IR-3-1:
Parameter IR-3-2:
fedramp.gov 272
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 273
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Incorporate lessons learned from ongoing incident handling activities into incident
response procedures, training, and testing, and implement the resulting changes
accordingly; and
d. Ensure the rigor, intensity, scope, and results of incident handling activities are
comparable and predictable across the organization.
Requirement: The FISMA definition of "incident" shall be used: "An occurrence that
actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity,
or availability of information or an information system; or constitutes a violation or
imminent threat of violation of law, security policies, security procedures, or acceptable
use policies."
Responsible Role:
fedramp.gov 274
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Responsible Role:
Parameter IR-4(1):
fedramp.gov 275
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter IR-4(2)-1:
Parameter IR-4(2)-2:
fedramp.gov 276
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 277
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
fedramp.gov 278
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter IR-4(11):
fedramp.gov 279
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Responsible Role:
fedramp.gov 280
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Responsible Role:
Parameter IR-5(1):
fedramp.gov 281
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Responsible Role:
fedramp.gov 282
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter IR-6(a):
Parameter IR-6(b):
Part a:
Part b:
fedramp.gov 283
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-6(1):
fedramp.gov 284
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 285
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 286
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-7(1):
1. Provides the organization with a roadmap for implementing its incident response
capability;
fedramp.gov 287
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
3. Provides a high-level approach for how the incident response capability fits into the
overall organization;
4. Meets the unique requirements of the organization, which relate to mission, size,
structure, and functions;
6. Provides metrics for measuring the incident response capability within the
organization;
b. Distribute copies of the incident response plan to [FedRAMP Assignment: see additional
FedRAMP Requirements and Guidance];
c. Update the incident response plan to address system and organizational changes or
problems encountered during plan implementation, execution, or testing;
e. Protect the incident response plan from unauthorized disclosure and modification.
(b) Requirement: The service provider defines a list of incident response personnel
(identified by name and/or by role) and organizational elements. The incident response
list includes designated FedRAMP personnel.
(d) Requirement: The service provider defines a list of incident response personnel
(identified by name and/or by role) and organizational elements. The incident response
list includes designated FedRAMP personnel.
fedramp.gov 288
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-8(a)(9)-1:
Parameter IR-8(a)(9)-2:
Parameter IR-8(a)(10):
Parameter IR-8(b):
Parameter IR-8(d):
Part a:
fedramp.gov 289
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part b:
Part c:
Part d:
Part e:
f. Identifying other systems or system components that may have been subsequently
contaminated; and
Responsible Role:
Parameter IR-9(a):
Parameter IR-9(c):
Parameter IR-9(g):
fedramp.gov 290
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
fedramp.gov 291
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-9(2):
fedramp.gov 292
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-9(3):
fedramp.gov 293
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter IR-9(4):
fedramp.gov 294
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Maintenance
Responsible Role:
Parameter MA-1(a):
Parameter MA-1(a)(1):
Parameter MA-1(b):
fedramp.gov 295
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter MA-1(c)(1)-1:
Parameter MA-1(c)(1)-2:
Parameter MA-1(c)(2)-1:
Parameter MA-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 296
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Approve and monitor all maintenance activities, whether performed on site or remotely
and whether the system or system components are serviced on site or removed to
another location;
d. Sanitize equipment to remove the following information from associated media prior to
removal from organizational facilities for off-site maintenance, repair, or replacement:
[Assignment: organization-defined information];
e. Check all potentially impacted controls to verify that the controls are still functioning
properly following maintenance, repair, or replacement actions; and
Responsible Role:
Parameter MA-2(c):
Parameter MA-2(d):
Parameter MA-2(f):
fedramp.gov 297
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
(b) Produce up-to date, accurate, and complete records of all maintenance, repair,
and replacement actions requested, scheduled, in process, and completed.
Responsible Role:
Parameter MA-2(2)(a):
fedramp.gov 298
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
fedramp.gov 299
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter MA-3(b):
Part a:
Part b:
fedramp.gov 300
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 301
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 302
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter MA-3(3)(d):
Part a:
Part b:
Part c:
fedramp.gov 303
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part d:
b. Allow the use of nonlocal maintenance and diagnostic tools only as consistent with
organizational policy and documented in the security plan for the system;
Responsible Role:
fedramp.gov 304
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Part a:
Part b:
Part c:
Part d:
Part e:
(b) Remove the component to be serviced from the system prior to nonlocal
maintenance or diagnostic services; sanitize the component (for organizational
information); and after the service is performed, inspect and sanitize the
component (for potentially malicious software) before reconnecting the component
to the system.
Responsible Role:
fedramp.gov 305
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Part a:
Part b:
b. Verify that non-escorted personnel performing maintenance on the system possess the
required access authorizations; and
Responsible Role:
fedramp.gov 306
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
fedramp.gov 307
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter MA-5(1)(b):
fedramp.gov 308
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Part a:
Part b:
Responsible Role:
Parameter MA-6-1:
Parameter MA-6-2:
fedramp.gov 309
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Media Protection
2. Procedures to facilitate the implementation of the media protection policy and the
associated media protection controls;
fedramp.gov 310
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter MP-1(a):
Parameter MP-1(a)(1):
Parameter MP-1(b):
Parameter MP-1(c)(1)-1:
Parameter MP-1(c)(1)-2:
Parameter MP-1(c)(2)-1:
Parameter MP-1(c)(2)-2:
fedramp.gov 311
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter MP-2-1:
Parameter MP-2-2:
fedramp.gov 312
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Exempt [FedRAMP Assignment: no removable media types] from marking if the media
remain within [FedRAMP Assignment: organization-defined security safeguards not
applicable].
Responsible Role:
Parameter MP-3(b)-1:
Parameter MP-3(b)-2:
fedramp.gov 313
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Protect system media types defined in MP-4a until the media are destroyed or sanitized
using approved equipment, techniques, and procedures.
(a) Requirement: The service provider defines controlled areas within facilities where
the information and information system reside.
Responsible Role:
fedramp.gov 314
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter MP-4(a)-1:
Parameter MP-4(a)-2:
Part a:
Part b:
fedramp.gov 315
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
requirements and utilizes FIPS validated or NSA approved cryptography (see SC-13.);
for non-digital media, secured in locked container];
b. Maintain accountability for system media during transport outside of controlled areas;
d. Restrict the activities associated with the transport of system media to authorized
personnel.
(a) Requirement: The service provider defines security measures to protect digital and
non-digital media in transport. The security measures are approved and accepted by the
JAB/AO.
Responsible Role:
Parameter MP-5(a)-1:
Parameter MP-5(a)-2:
fedramp.gov 316
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
b. Employ sanitization mechanisms with the strength and integrity commensurate with the
security category or classification of the information.
Responsible Role:
Parameter MP-6(a)-1:
Parameter MP-6(a)-2:
fedramp.gov 317
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
fedramp.gov 318
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
fedramp.gov 319
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter MP-6(2):
fedramp.gov 320
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter MP-6(3):
fedramp.gov 321
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Prohibit the use of portable storage devices in organizational systems when such
devices have no identifiable owner.
Responsible Role:
Parameter MP-7(a)-1:
Parameter MP-7(a)-2:
Parameter MP-7(a)-3:
Parameter MP-7(a)-4:
fedramp.gov 322
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
fedramp.gov 323
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-1(a):
Parameter PE-1(a)(1):
Parameter PE-1(b):
Parameter PE-1(c)(1)-1:
Parameter PE-1(c)(1)-2:
Parameter PE-1(c)(2)-1:
Parameter PE-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 324
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
c. Review the access list detailing authorized facility access by individuals [FedRAMP
Assignment: at least every ninety (90) days]; and
d. Remove individuals from the facility access list when access is no longer required.
Responsible Role:
Parameter PE-2(c):
fedramp.gov 325
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
2. Controlling ingress and egress to the facility using [FedRAMP Assignment: CSP
defined physical access control systems/devices AND guards];
b. Maintain physical access audit logs for [Assignment: organization-defined entry or exit
points];
d. Escort visitors and control visitor activity [FedRAMP Assignment: in all circumstances
within restricted access area where the information system resides];
fedramp.gov 326
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-3(a):
Parameter PE-3(a)(2):
Parameter PE-3(b):
Parameter PE-3(c):
Parameter PE-3(d):
Parameter PE-3(f)-1:
Parameter PE-3(f)-2:
Parameter PE-3(g):
fedramp.gov 327
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
Responsible Role:
Parameter PE-3(1):
fedramp.gov 328
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-4-1:
Parameter PE-4-2:
fedramp.gov 329
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Responsible Role:
Parameter PE-5:
fedramp.gov 330
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
b. Review physical access logs [FedRAMP Assignment: at least monthly] and upon
occurrence of [Assignment: organization-defined events or potential indications of
events]; and
Responsible Role:
fedramp.gov 331
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter PE-6(b)-1:
Parameter PE-6(b)-2:
Part a:
Part b:
Part c:
fedramp.gov 332
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 333
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-6(4):
fedramp.gov 334
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-8(a):
Parameter PE-8(b):
Parameter PE-8(c):
fedramp.gov 335
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter PE-8(1):
fedramp.gov 336
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 337
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Place emergency shutoff switches or devices in [FedRAMP Assignment: near more than
one egress point of the IT area and ensures it is labeled and protected by a cover to
prevent accidental shut-off] to facilitate access for authorized personnel; and
Responsible Role:
Parameter PE-10(a):
Parameter PE-10(b):
fedramp.gov 338
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter PE-11:
fedramp.gov 339
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-11(1):
fedramp.gov 340
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 341
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 342
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-13(1)-1:
Parameter PE-13(1)-2:
fedramp.gov 343
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
(b) Employ an automatic fire suppression capability when the facility is not staffed on
a continuous basis.
Responsible Role:
Parameter PE-13(2)(a)-1:
Parameter PE-13(2)(a)-2:
fedramp.gov 344
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
fedramp.gov 345
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(a) Requirement: The service provider measures temperature at server inlets and
humidity levels by dew point.
Responsible Role:
Parameter PE-14(a)-1:
Parameter PE-14(a)-2:
Parameter PE-14(b):
fedramp.gov 346
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter PE-14(2):
fedramp.gov 347
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 348
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-15(1)-1:
Parameter PE-15(1)-2:
fedramp.gov 349
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PE-16(a):
fedramp.gov 350
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
d. Provide a means for employees to communicate with information security and privacy
personnel in case of incidents.
Responsible Role:
Parameter PE-17(a):
Parameter PE-17(b):
fedramp.gov 351
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Responsible Role:
Parameter PE-18:
fedramp.gov 352
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Planning
fedramp.gov 353
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PL-1(a):
Parameter PL-1(a)(1):
Parameter PL-1(b):
Parameter PL-1(c)(1)-1:
Parameter PL-1(c)(1)-2:
Parameter PL-1(c)(2)-1:
Parameter PL-1(c)(2)-2:
fedramp.gov 354
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
3. Describe the operational context of the system in terms of mission and business
processes;
5. Identify the information types processed, stored, and transmitted by the system;
7. Describe any specific threats to the system that are of concern to the organization;
8. Provide the results of a privacy risk assessment for systems processing personally
identifiable information;
fedramp.gov 355
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
9. Describe the operational environment for the system and any dependencies on or
connections to other systems or system components;
10. Provide an overview of the security and privacy requirements for the system;
12. Describe the controls in place or planned for meeting the security and privacy
requirements, including a rationale for any tailoring decisions;
13. Include risk determinations for security and privacy architecture and design
decisions;
14. Include security- and privacy-related activities affecting the system that require
planning and coordination with [FedRAMP Assignment: to include chief privacy
and ISSO and/or similar role or designees]; and
15. Are reviewed and approved by the authorizing official or designated representative
prior to plan implementation.
b. Distribute copies of the plans and communicate subsequent changes to the plans to
[FedRAMP Assignment: to include chief privacy and ISSO and/or similar role];
d. Update the plans to address changes to the system and environment of operation or
problems identified during plan implementation or control assessments; and
Responsible Role:
Parameter PL-2(a)(14):
Parameter PL-2(b):
Parameter PL-2(c):
fedramp.gov 356
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
fedramp.gov 357
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Receive a documented acknowledgment from such individuals, indicating that they have
read, understand, and agree to abide by the rules of behavior, before authorizing
access to information and the system;
c. Review and update the rules of behavior [FedRAMP Assignment: at least annually]; and
d. Require individuals who have acknowledged a previous version of the rules of behavior
to read and re-acknowledge [FedRAMP Assignment: at least annually and when the
rules are revised or changed].
Responsible Role:
Parameter PL-4(c):
Parameter PL-4(d):
fedramp.gov 358
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
(a) Use of social media, social networking sites, and external sites/applications;
Responsible Role:
fedramp.gov 359
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
3. Describe how the architectures are integrated into and support the enterprise
architecture; and
4. Describe any assumptions about, and dependencies on, external systems and
services;
b. Review and update the architectures [FedRAMP Assignment: at least annually and
when a significant change occurs] to reflect changes in the enterprise architecture; and
fedramp.gov 360
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PL-8(b):
Part a:
Part b:
Part c:
fedramp.gov 361
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 362
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 363
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Personnel Security
2. Procedures to facilitate the implementation of the personnel security policy and the
associated personnel security controls;
Responsible Role:
Parameter PS-1(a):
Parameter PS-1(a)(1):
Parameter PS-1(b):
fedramp.gov 364
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter PS-1(c)(1)-1:
Parameter PS-1(c)(1)-2:
Parameter PS-1(c)(2)-1:
Parameter PS-1(c)(2)-2:
Part a:
Part b:
Part c:
c. Review and update position risk designations [FedRAMP Assignment: at least annually].
fedramp.gov 365
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PS-2(c):
Part a:
Part b:
Part c:
fedramp.gov 366
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PS-3(b):
fedramp.gov 367
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
(a) Have valid access authorizations that are demonstrated by assigned official
government duties; and
Responsible Role:
Parameter PS-3(3)(b):
fedramp.gov 368
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Terminate or revoke any authenticators and credentials associated with the individual;
Responsible Role:
Parameter PS-4(a):
Parameter PS-4(c):
fedramp.gov 369
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
fedramp.gov 370
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter PS-4(2)-1:
Parameter PS-4(2)-2:
fedramp.gov 371
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
d. Notify [FedRAMP Assignment: including access control personnel responsible for the
system] within [FedRAMP Assignment: twenty-four (24) hours].
Responsible Role:
Parameter PS-5(b)-1:
Parameter PS-5(b)-2:
Parameter PS-5(d)-1:
Parameter PS-5(d)-2:
fedramp.gov 372
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
b. Review and update the access agreements [FedRAMP Assignment: at least annually];
and
Responsible Role:
Parameter PS-6(b):
fedramp.gov 373
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter PS-6(c)(2):
Part a:
Part b:
Part c:
fedramp.gov 374
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Require external providers to comply with personnel security policies and procedures
established by the organization;
Responsible Role:
Parameter PS-7(d)-1:
Parameter PS-7(d)-2:
fedramp.gov 375
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
b. Notify [FedRAMP Assignment: to include the ISSO and/or similar role within the
organization] within [FedRAMP Assignment: Twenty-four (24) hours] when a formal
employee sanctions process is initiated, identifying the individual sanctioned and the
reason for the sanction.
Responsible Role:
Parameter PS-8(b)-1:
Parameter PS-8(b)-2:
fedramp.gov 376
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
fedramp.gov 377
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Risk Assessment
fedramp.gov 378
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
2. Procedures to facilitate the implementation of the risk assessment policy and the
associated risk assessment controls;
Responsible Role:
Parameter RA-1(a):
Parameter RA-1(a)(1):
Parameter RA-1(b):
Parameter RA-1(c)(1)-1:
Parameter RA-1(c)(1)-2:
Parameter RA-1(c)(2)-1:
Parameter RA-1(c)(2)-2:
fedramp.gov 379
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Responsible Role:
fedramp.gov 380
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
2. Determining the likelihood and magnitude of harm from unauthorized access, use,
disclosure, disruption, modification, or destruction of the system, the information it
processes, stores, or transmits, and any related information; and
fedramp.gov 381
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Integrate risk assessment results and risk management decisions from the organization
and mission or business process perspectives with system-level risk assessments;
d. Review risk assessment results [FedRAMP Assignment: at least annually and whenever
a significant change occurs];
f. Update the risk assessment [FedRAMP Assignment: annually] or when there are
significant changes to the system, its environment of operation, or other conditions that
may impact the security or privacy state of the system.
(e) Requirement: Include all Authorizing Officials; for JAB authorizations to include
FedRAMP.
Responsible Role:
Parameter RA-3(c):
Parameter RA-3(d):
Parameter RA-3(e):
Parameter RA-3(f):
fedramp.gov 382
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
fedramp.gov 383
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter RA-3(1)(a):
Parameter RA-3(1)(b):
Part a:
Part b:
fedramp.gov 384
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
e. Share information obtained from the vulnerability monitoring process and control
assessments with [Assignment: organization-defined personnel or roles] to help
eliminate similar vulnerabilities in other systems; and
f. Employ vulnerability monitoring tools that include the capability to readily update the
vulnerabilities to be scanned.
Guidance: See the FedRAMP Documents page > Vulnerability Scanning Requirements
https://www.FedRAMP.gov/documents/
Guidance: Informational findings from a scanner are detailed as a returned result that
holds no vulnerability risk or severity, and for FedRAMP, does not require an entry onto
the POA&M or entry onto the RET during any assessment phase.
Warning findings, on the other hand, are given a risk rating (low, moderate, high or
critical) by the scanning solution and should be treated like any other finding with a risk
fedramp.gov 385
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
or severity rating for tracking purposes onto either the POA&M or RET depending on
when the findings originated (during assessments or during monthly continuous
monitoring). If a warning is received during scanning, but further validation turns up no
actual issue then this item should be categorized as a false positive. If this situation
presents itself during an assessment phase (initial assessment, annual assessment or
any SCR), follow guidance on how to report false positives in the Security Assessment
Report (SAR). If this situation happens during monthly continuous monitoring, a
deviation request will need to be submitted per the FedRAMP Vulnerability Deviation
Request Form.
Warnings are commonly associated with scanning solutions that also perform
compliance scans, and if the scanner reports a “warning” as part of the compliance
scanning of a CSO, follow guidance surrounding the tracking of compliance findings
during either the assessment phases (initial assessment, annual assessment or any
SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan
findings can be found by searching on “Tracking of Compliance Scans” in FAQs.
(e) Requirement: to include all Authorizing Officials; for JAB authorizations to include
FedRAMP.
Responsible Role:
Parameter RA-5(a):
Parameter RA-5(d):
Parameter RA-5(e):
fedramp.gov 386
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
fedramp.gov 387
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter RA-5(2):
fedramp.gov 388
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Responsible Role:
fedramp.gov 389
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter RA-5(4):
fedramp.gov 390
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter RA-5(5)-1:
Parameter RA-5(5)-2:
fedramp.gov 391
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: This enhancement is required for all high (or critical) vulnerability scan
findings.
Responsible Role:
Parameter RA-5(8)-1:
Parameter RA-5(8)-2:
fedramp.gov 392
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 393
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 394
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter RA-9-1:
Parameter RA-9-2:
fedramp.gov 395
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 396
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SA-1(a):
Parameter SA-1(a)(1):
Parameter SA-1(b):
Parameter SA-1(c)(1)-1:
Parameter SA-1(c)(1)-2:
Parameter SA-1(c)(2)-1:
Parameter SA-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 397
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Determine, document, and allocate the resources required to protect the system or
system service as part of the organizational capital planning and investment control
process; and
c. Establish a discrete line item for information security and privacy in organizational
programming and budgeting documentation.
Responsible Role:
fedramp.gov 398
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
b. Define and document information security and privacy roles and responsibilities
throughout the system development life cycle;
c. Identify individuals having information security and privacy roles and responsibilities; and
d. Integrate the organizational information security and privacy risk management process
into system development life cycle activities.
Responsible Role:
Parameter SA-3(a):
fedramp.gov 399
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
fedramp.gov 400
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
i. Acceptance criteria.
Guidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly
preferred.
See https://www.niap-ccevs.org/Product/index.cfm or
https://www.commoncriteriaportal.org/products/.
Requirement: The service provider must comply with Federal Acquisition Regulation
(FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense
Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart
4.21, which implements Section 889 (as well as any added updates related to FISMA to
address security concerns in the system acquisitions process).
Responsible Role:
Parameter SA-4:
fedramp.gov 401
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
Part e:
Part f:
Part g:
Part h:
Part i:
Responsible Role:
fedramp.gov 402
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
fedramp.gov 403
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SA-4(2)-1:
Parameter SA-4(2)-2:
(a) Deliver the system, component, or service with [FedRAMP Assignment: The
service provider shall use the DoD STIGs to establish configuration settings;
Center for Internet Security up to Level 2 (CIS Level 2) guidelines shall be used if
fedramp.gov 404
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
STIGs are not available; Custom baselines shall be used if CIS is not available.]
implemented; and
(b) Use the configurations as the default for any subsequent system, component, or
service reinstallation or upgrade.
Responsible Role:
Parameter SA-4(5)(a):
Part a:
Part b:
fedramp.gov 405
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 406
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 407
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
2. Effective use and maintenance of security and privacy functions and mechanisms;
and
b. Obtain or develop user documentation for the system, system component, or system
service that describes:
2. Methods for user interaction, which enables individuals to use the system,
component, or service in a more secure manner and protect individual privacy; and
Responsible Role:
Parameter SA-5(c):
Parameter SA-5(d):
fedramp.gov 408
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
fedramp.gov 409
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SA-8:
fedramp.gov 410
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Define and document organizational oversight and user roles and responsibilities with
regard to external system services; and
c. Employ the following processes, methods, and techniques to monitor control compliance
by external service providers on an ongoing basis: [FedRAMP Assignment:
Federal/FedRAMP Continuous Monitoring requirements must be met for external
systems where Federal information is processed or stored].
Responsible Role:
Parameter SA-9(a):
Parameter SA-9(c):
fedramp.gov 411
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter SA-9(1)(b):
fedramp.gov 412
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter SA-9(2):
fedramp.gov 413
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SA-9(5)-1:
Parameter SA-9(5)-2:
Parameter SA-9(5)-3:
fedramp.gov 414
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
d. Document approved changes to the system, component, or service and the potential
security and privacy impacts of such changes; and
e. Track security flaws and flaw resolution within the system, component, or service and
report findings to [Assignment: organization-defined personnel].
fedramp.gov 415
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(e) Requirement: track security flaws and flaw resolution within the system, component,
or service and report findings to organization-defined personnel, to include FedRAMP.
Responsible Role:
Parameter SA-10(a):
Parameter SA-10(b):
Parameter SA-10(e):
Part a:
fedramp.gov 416
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part b:
Part c:
Part d:
Part e:
a. Develop and implement a plan for ongoing security and privacy assessments;
c. Produce evidence of the execution of the assessment plan and the results of the testing
and evaluation;
Responsible Role:
Parameter SA-11(b)-1:
Parameter SA-11(b)-2:
Parameter SA-11(b)-3:
fedramp.gov 417
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Part e:
Requirement: The service provider must document its methodology for reviewing newly
developed code for the Service in its Continuous Monitoring Plan.
fedramp.gov 418
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
If Static code analysis cannot be performed (for example, when the source code is not
available), then dynamic code analysis must be performed (see SA-11 (8)).
Responsible Role:
fedramp.gov 419
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(b) Employs the following tools and methods: [Assignment: organization-defined tools
and methods];
(c) Conducts the modeling and analyses at the following level of rigor: [Assignment:
organization-defined breadth and depth of modeling and analyses]; and
(d) Produces evidence that meets the following acceptance criteria: [Assignment:
organization-defined acceptance criteria].
Responsible Role:
Parameter SA-11(2)(a):
Parameter SA-11(2)(b):
Parameter SA-11(2)(c):
Parameter SA-11(2)(d):
fedramp.gov 420
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
3. Documents the specific tool options and tool configurations used in the
development process; and
4. Documents, manages, and ensures the integrity of changes to the process and/or
tools used in development; and
b. Review the development process, standards, tools, tool options, and tool configurations
[FedRAMP Assignment: frequency as before first use and annually thereafter] to
fedramp.gov 421
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
determine if the process, standards, tools, tool options and tool configurations selected
and employed can satisfy the following security and privacy requirements: [FedRAMP
Assignment: FedRAMP Security Authorization requirements].
Responsible Role:
Parameter SA-15(b)-1:
Parameter SA-15(b)-2:
Part a:
Part b:
fedramp.gov 422
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(a) At the following decision points in the system development life cycle: [Assignment:
organization-defined decision points in the system development life cycle]; and
(b) At the following level of rigor: [Assignment: organization-defined breadth and depth
of criticality analysis].
Responsible Role:
Parameter SA-15(3)(a):
Parameter SA-15(3)(b):
fedramp.gov 423
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter SA-16:
fedramp.gov 424
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
a. Is consistent with the organization’s security and privacy architecture that is an integral
part the organization’s enterprise architecture;
b. Accurately and completely describes the required security and privacy functionality, and
the allocation of controls among physical and logical components; and
c. Expresses how individual security and privacy functions, mechanisms, and services
work together to provide required security and privacy capabilities and a unified
approach to protection.
Responsible Role:
fedramp.gov 425
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
fedramp.gov 426
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SA-21:
Parameter SA-21(a):
Parameter SA-21(b):
Part a:
Part b:
fedramp.gov 427
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Provide the following options for alternative sources for continued support for
unsupported components [Selection (one-or-more): in-house support; [Assignment:
organization-defined support from external providers]].
Responsible Role:
Parameter SA-22(b):
fedramp.gov 428
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
fedramp.gov 429
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-1(a):
Parameter SC-1(a)(1):
Parameter SC-1(b):
Parameter SC-1(c)(1)-1:
Parameter SC-1(c)(1)-2:
Parameter SC-1(c)(2)-1:
Parameter SC-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 430
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 431
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 432
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 433
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-5(a)-1:
Parameter SC-5(a)-2:
Parameter SC-5(b):
Part a:
fedramp.gov 434
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part b:
(b) Guidance: SC-7 (b) should be met by subnet isolation. A subnetwork (subnet) is a
physically or logically segmented section of a larger network defined at TCP/IP Layer 3,
to both minimize traffic and, important for a FedRAMP Authorization, add a crucial layer
of network isolation. Subnets are distinct from VLANs (Layer 2), security groups, and
VPCs and are specifically required to satisfy SC-7 part b and other controls.
Responsible Role:
Parameter SC-7(b):
fedramp.gov 435
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Part a:
Part b:
Part c:
Responsible Role:
fedramp.gov 436
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
(c) Protect the confidentiality and integrity of the information being transmitted across
each interface;
(d) Document each exception to the traffic flow policy with a supporting mission or
business need and duration of that need;
(e) Review exceptions to the traffic flow policy [FedRAMP Assignment: at least every
ninety (90) days or whenever there is a change in the threat environment that
warrants a review of the exceptions] and remove exceptions that are no longer
supported by an explicit mission or business need;
(f) Prevent unauthorized exchange of control plane traffic with external networks;
fedramp.gov 437
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-7(4)(e):
Part a:
Part b:
fedramp.gov 438
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part c:
Part d:
Part e:
Part f:
Part g:
Part h:
Guidance: For JAB Authorization, CSPs shall include details of this control in their
Architecture Briefing
Responsible Role:
Parameter SC-7(5):
fedramp.gov 439
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-7(7):
fedramp.gov 440
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-7(8)-1:
Parameter SC-7(8)-2:
fedramp.gov 441
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Responsible Role:
Parameter SC-7(10)(b):
fedramp.gov 442
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Part a:
Part b:
Responsible Role:
Parameter SC-7(12)-1:
Parameter SC-7(12)-2:
fedramp.gov 443
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
fedramp.gov 444
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter SC-7(20):
fedramp.gov 445
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter SC-7(21)-1:
Parameter SC-7(21)-2:
fedramp.gov 446
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Guidance: For each instance of data in transit, confidentiality AND integrity should be
through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5),
or in combination.
For clarity, this control applies to all data in transit. Examples include the following data
flows:
fedramp.gov 447
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Flows from management tools required for their work – e.g. log collection,
scanning, etc.
The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).
SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when
outside of Controlled Access Area (CAA)]
Guidance: SC-8 (5) applies when physical protection has been selected as the method
to protect confidentiality and integrity. For physical protection, data in transit must be in
either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.
Controlled Access Area (CAA): Data will be considered physically protected, and in a
CAA if it meets Section 2.3 of the DHS’s Recommended Practice: Improving Industrial
Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section
2.3 of the DHS’ recommended practice by satisfactory implementation of the following
controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3). Note:
When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must
be added to the SSP. CNSSI No.7003 can be accessed here:
https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_201
5.pdf DHS Recommended Practice: Improving Industrial Control System Cybersecurity
fedramp.gov 448
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-8:
fedramp.gov 449
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic
within their environment" SC-8 (1) applies when encryption has been selected as the
method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is
strongly encouraged.
Guidance: Note that this enhancement requires the use of cryptography which must be
compliant with Federal requirements and utilize FIPS validated or NSA approved
cryptography (see SC-13.)
Guidance: When leveraging encryption from the underlying IaaS/PaaS: While some
IaaS/PaaS services provide encryption by default, many require encryption to be
configured and enabled by the customer. The CSP has the responsibility to verify
encryption is properly configured.
Requirement: Please ensure SSP Section 10.3 Cryptographic Modules Implemented for
Data At Rest (DAR) and Data In Transit (DIT) is fully populated for reference in this
control.
Responsible Role:
Parameter SC-8(1):
fedramp.gov 450
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-10:
fedramp.gov 451
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Wildcard certificates may be used internally within the system, but are not
permitted for external customer access to the system.
Responsible Role:
fedramp.gov 452
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SC-12:
Responsible Role:
fedramp.gov 453
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Implement the following types of cryptography required for each specified cryptographic
use: [FedRAMP Assignment: FIPS-validated or NSA-approved cryptography].
fedramp.gov 454
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: This control applies to all use of cryptography. In addition to encryption, this
includes functions such as hashing, random number generation, and key generation.
Examples include the following:
Encryption of data
Decryption of data
The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS
140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program
(CMVP). https://csrc.nist.gov/projects/cryptographic-module-validation-program.
Guidance: At a minimum, this control applies to cryptography in use for the following
controls: AU-9(3), CP-9(8), IA-2(6), IA-5(1), MP-5, SC-8(1), and SC-28(1).
Responsible Role:
fedramp.gov 455
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SC-13(a):
Parameter SC-13(b):
Part a:
Part b:
fedramp.gov 456
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-15(a):
fedramp.gov 457
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
Part a:
Part b:
b. Include only approved trust anchors in trust stores or certificate stores managed by the
organization.
Responsible Role:
Parameter SC-17(a):
fedramp.gov 458
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Authorize, monitor, and control the use of mobile code within the system.
Responsible Role:
fedramp.gov 459
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
b. Provide the means to indicate the security status of child zones and (if the child supports
secure resolution services) to enable verification of a chain of trust among parent and
child domains, when operating as part of a distributed, hierarchical namespace.
Guidance: SC-20 applies to use of external authoritative DNS to access a CSO from
outside the boundary.
fedramp.gov 460
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Part a:
Part b:
fedramp.gov 461
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: SC-21 applies to use of internal recursive DNS to access a domain outside
the boundary by a component inside the boundary. DNSSEC resolution to access a
component inside the boundary is excluded.
If the reply is signed, and fails DNSSEC, do not use the reply
Responsible Role:
fedramp.gov 462
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 463
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 464
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SC-24-1:
Parameter SC-24-2:
Parameter SC-24-3:
fedramp.gov 465
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
fedramp.gov 466
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Note that this enhancement requires the use of cryptography in accordance
with SC-13.
Responsible Role:
Parameter SC-28-1:
Parameter SC-28-2:
fedramp.gov 467
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Guidance: Organizations should select a mode of protection that is targeted towards the
relevant threat scenarios.
Examples:
A. Organizations may apply full disk encryption (FDE) to a mobile device where the
primary threat is loss of the device while storage is locked.
B. For a database application housing data for a single customer, encryption at the file
system level would often provide more protection than FDE against the more likely threat
of an intruder on the operating system accessing the storage.
C. For a database application housing data for multiple customers, encryption with
unique keys for each customer at the database record level may be more appropriate.
Responsible Role:
Parameter SC-28(1)-1:
Parameter SC-28(1)-2:
fedramp.gov 468
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 469
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 470
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
(b) Synchronize the internal system clocks to the authoritative time source when the
time difference is greater than [FedRAMP Assignment: any difference].
Requirement: The service provider selects primary and secondary time servers
used by the NIST Internet time service. The secondary server is selected from a
different geographic region than the primary server.
Responsible Role:
fedramp.gov 471
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SC-45(1)(a)-1:
Parameter SC-45(1)(a)-2:
Parameter SC-45(1)(b):
Part a:
Part b:
fedramp.gov 472
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-1(a):
Parameter SI-1(a)(1):
Parameter SI-1(b):
fedramp.gov 473
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SI-1(c)(1)-1:
Parameter SI-1(c)(1)-2:
Parameter SI-1(c)(2)-1:
Parameter SI-1(c)(2)-2:
Part a:
Part b:
Part c:
fedramp.gov 474
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Test software and firmware updates related to flaw remediation for effectiveness and
potential side effects before installation;
Responsible Role:
Parameter SI-2(c):
Part a:
fedramp.gov 475
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part b:
Part c:
Part d:
Responsible Role:
Parameter SI-2(2)-1:
Parameter SI-2(2)-2:
fedramp.gov 476
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
SI-2(3) Time to Remediate Flaws and Benchmarks for Corrective Actions (M)(H)
(a) Measure the time between flaw identification and flaw remediation; and
(b) Establish the following benchmarks for taking corrective actions: [Assignment:
organization-defined benchmarks].
Responsible Role:
Parameter SI-2(3)(b):
fedramp.gov 477
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
1. Perform periodic scans of the system [FedRAMP Assignment: at least weekly] and
real-time scans of files from external sources at [FedRAMP Assignment: to include
endpoints and network entry and exit points] as the files are downloaded, opened,
or executed in accordance with organizational policy; and
2. [FedRAMP Assignment: [to include blocking and quarantining malicious code]; and
send alert to [FedRAMP Assignment: [administrator or defined security personnel
near-real time] in response to malicious code detection; and
d. Address the receipt of false positives during malicious code detection and eradication
and the resulting potential impact on the availability of the system.
fedramp.gov 478
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-3(a):
Parameter SI-3(c)(1)-1:
Parameter SI-3(c)(1)-2:
Parameter SI-3(c)(2)-1:
Parameter SI-3(c)(2)-2:
Part a:
Part b:
fedramp.gov 479
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part c:
Part d:
b. Identify unauthorized use of the system through the following techniques and methods:
[Assignment: organization-defined techniques and methods];
e. Adjust the level of system monitoring activity when there is a change in risk to
organizational operations and assets, individuals, other organizations, or the Nation;
fedramp.gov 480
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-4(a)(1):
Parameter SI-4(b):
Parameter SI-4(g)-1:
Parameter SI-4(g)-2:
Parameter SI-4(g)-3:
Part a:
Part b:
fedramp.gov 481
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part c:
Part d:
Part e:
Part f:
Part g:
Responsible Role:
fedramp.gov 482
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Responsible Role:
fedramp.gov 483
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-4(4)(b)-1:
Parameter SI-4(4)(b)-2:
fedramp.gov 484
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter SI-4(5)-1:
Parameter SI-4(5)-2:
fedramp.gov 485
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: The service provider must support Agency requirements to comply with
M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-
the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-
Cybersecurity-Incidents.pdf) and M-22-09
(https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf).
Responsible Role:
Parameter SI-4(10)-1:
Parameter SI-4(10)-2:
fedramp.gov 486
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter SI-4(11):
fedramp.gov 487
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter SI-4(12)-1:
fedramp.gov 488
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SI-4(12)-2:
Parameter SI-4(12)-3:
fedramp.gov 489
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Responsible Role:
fedramp.gov 490
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter SI-4(18):
fedramp.gov 491
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Responsible Role:
Parameter SI-4(19)-1:
fedramp.gov 492
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SI-4(19)-2:
fedramp.gov 493
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-4(20):
fedramp.gov 494
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-4(22)(a):
Parameter SI-4(22)(b):
Part a:
Part b:
fedramp.gov 495
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-4(23)-1:
Parameter SI-4(23)-2:
fedramp.gov 496
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
d. Implement security directives in accordance with established time frames, or notify the
issuing organization of the degree of noncompliance.
Requirement: Service Providers must address the CISA Emergency and Binding
Operational Directives applicable to their cloud service offering per FedRAMP guidance.
This includes listing the applicable directives and stating compliance status.
Responsible Role:
Parameter SI-5(a):
Parameter SI-5(c):
fedramp.gov 497
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Part a:
Part b:
Part c:
Part d:
Responsible Role:
Parameter SI-5(1):
fedramp.gov 498
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
fedramp.gov 499
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
d. [Selection (one-or-more): Shut the system down; Restart the system; alternative
actions(s)] when anomalies are discovered.
Responsible Role:
Parameter SI-6(a):
Parameter SI-6(b):
Parameter SI-6(c):
Parameter SI-6(d):
fedramp.gov 500
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Part d:
b. Take the following actions when unauthorized changes to the software, firmware, and
information are detected: [Assignment: organization-defined actions].
Responsible Role:
Parameter SI-7(a):
Parameter SI-7(b):
fedramp.gov 501
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter SI-7(1)-1:
Parameter SI-7(1)-2:
fedramp.gov 502
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-7(2):
fedramp.gov 503
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Responsible Role:
Parameter SI-7(5):
fedramp.gov 504
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Not Applicable
Responsible Role:
Parameter SI-7(7):
fedramp.gov 505
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
Responsible Role:
Parameter SI-7(15):
fedramp.gov 506
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Planned
Alternative implementation
Not Applicable
b. Update spam protection mechanisms when new releases are available in accordance
with organizational configuration management policy and procedures.
Guidance: When CSO sends email on behalf of the government as part of the business
offering, Control Description should include implementation of Domain-based Message
Authentication, Reporting & Conformance (DMARC) on the sending domain for outgoing
messages as described in DHS Binding Operational Directive (BOD) 18-01.
https://cyber.dhs.gov/bod/18-01/.
fedramp.gov 507
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Part a:
Part b:
fedramp.gov 508
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-8(2):
fedramp.gov 509
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SI-10:
fedramp.gov 510
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
b. Reveal error messages only to [FedRAMP Assignment: to include the ISSO and/or
similar role within the organization].
Responsible Role:
Parameter SI-11(b):
fedramp.gov 511
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
fedramp.gov 512
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
Responsible Role:
Parameter SI-16:
fedramp.gov 513
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Inherited from pre-existing FedRAMP Authorization for [Click here to enter text], Date of
Authorization
fedramp.gov 514
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SR-1(a):
Parameter SR-1(a)(1):
Parameter SR-1(b):
Parameter SR-1(c)(1)-1:
Parameter SR-1(c)(1)-2:
Parameter SR-1(c)(2)-1:
Parameter SR-1(c)(2)-2:
Part a:
fedramp.gov 515
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part b:
Part c:
b. Review and update the supply chain risk management plan [FedRAMP Assignment: at
least annually] or as required to address threat, organizational, or environmental
changes; and
c. Protect the supply chain risk management plan from unauthorized disclosure and
modification.
Responsible Role:
Parameter SR-2(a):
Parameter SR-2(b):
fedramp.gov 516
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter SR-2(1)-1:
Parameter SR-2(1)-2:
fedramp.gov 517
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Alternative implementation
Not Applicable
b. Employ the following controls to protect against supply chain risks to the system, system
component, or system service and to limit the harm or consequences from supply chain-
related events: [Assignment: organization-defined supply chain controls]; and
c. Document the selected and implemented supply chain processes and controls in
[Selection: security and privacy plans; supply chain risk management plan [Assignment:
organization-defined document]].
fedramp.gov 518
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: CSO must document and maintain the supply chain custody, including
replacement devices, to ensure the integrity of the devices before being introduced to
the boundary.
Responsible Role:
Parameter SR-3(a)-1:
Parameter SR-3(a)-2:
Parameter SR-3(b):
Parameter SR-3(c):
fedramp.gov 519
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Part c:
Responsible Role:
Parameter SR-5:
fedramp.gov 520
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: CSOs must ensure that their supply chain vendors build and test their
systems in alignment with NIST SP 800-171 or a commensurate security and
compliance framework. CSOs must ensure that vendors are compliant with physical
facility access and logical access controls to supplied products.
Responsible Role:
Parameter SR-6:
fedramp.gov 521
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: CSOs must ensure and document how they receive notifications from
their supply chain vendor of newly discovered vulnerabilities including zero-day
vulnerabilities.
Responsible Role:
Parameter SR-8:
fedramp.gov 522
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Implemented
Partially Implemented
Planned
Alternative implementation
Not Applicable
Requirement: CSOs must ensure vendors provide authenticity of software and patches
supplied to the service provider including documenting the safeguards in place.
Responsible Role:
fedramp.gov 523
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 524
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
fedramp.gov 525
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Parameter SR-10-1:
Parameter SR-10-2:
fedramp.gov 526
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Requirement: CSOs must ensure that their supply chain vendors provide authenticity of
software and patches and the vendor must have a plan to protect the development
pipeline.
Responsible Role:
Parameter SR-11(b):
fedramp.gov 527
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Part a:
Part b:
Responsible Role:
Parameter SR-11(1):
fedramp.gov 528
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SR-11(2):
fedramp.gov 529
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Responsible Role:
Parameter SR-12-1:
Parameter SR-12-2:
fedramp.gov 530
FedRAMP® System Security Plan (SSP) Appendix A: High FedRAMP Security Controls
<Insert CSP Name> | <Insert CSO Name> | <Insert Version X.X | <Insert MM/DD/YYYY>
Authorization
fedramp.gov 531