AC-1
Policy and Procedures
CM0005
NA
YES
AC-2
Account Management
CM0005
NA
NA
1
Account Management | Automated System Account Management
CM0005
|
CM0002
|
CM0055
NA
NA
2
Account Management | Automated Temporary and Emergency Account Management
CM0005
|
CM0002
|
CM0055
NA
NA
3
Account Management | Disable Accounts
CM0005
|
CM0002
|
CM0055
NA
NA
4
Account Management | Automated Audit Actions
CM0005
|
CM0002
|
CM0055
NA
NA
5
Account Management | Inactivity Logout
CM0005
|
CM0002
|
CM0055
NA
NA
6
Account Management | Dynamic Privilege Management
CM0005
|
CM0002
|
CM0055
NA
NA
7
Account Management | Privileged User Accounts
CM0005
|
CM0002
|
CM0055
NA
NA
8
Account Management | Dynamic Account Management
CM0005
|
CM0002
|
CM0055
NA
NA
9
Account Management | Restrictions on Use of Shared and Group Accounts
CM0005
|
CM0002
|
CM0055
NA
NA
11
Account Management | Usage Conditions
CM0005
|
CM0002
|
CM0055
NA
NA
12
Account Management | Account Monitoring for Atypical Usage
CM0005
|
CM0002
|
CM0055
NA
NA
13
Account Management | Disable Accounts for High-risk Individuals
CM0005
|
CM0002
|
CM0055
NA
NA
AC-3
Access Enforcement
CM0055
|
CM0005
NA
YES
2
Access Enforcement | Dual Authorization
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
YES
YES
3
Access Enforcement | Mandatory Access Control
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
YES
4
Access Enforcement | Discretionary Access Control
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
YES
5
Access Enforcement | Security-relevant Information
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
NA
7
Access Enforcement | Role-based Access Control
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
NA
8
Access Enforcement | Revocation of Access Authorizations
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
YES
9
Access Enforcement | Controlled Release
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
NA
10
Access Enforcement | Audited Override of Access Control Mechanisms
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
YES
YES
11
Access Enforcement | Restrict Access to Specific Information Types
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
YES
YES
12
Access Enforcement | Assert and Enforce Application Access
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
NA
13
Access Enforcement | Attribute-based Access Control
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
YES
YES
14
Access Enforcement | Individual Access
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
NA
15
Access Enforcement | Discretionary and Mandatory Access Control
CM0054
|
CM0055
|
CM0005
|
CM0002
|
CM0001
|
CM0008
|
CM0052
|
CM0049
|
CM0004
|
CM0007
|
CM0035
|
CM0039
NA
NA
AC-4
Information Flow Enforcement
CM0050
|
CM0005
|
CM0038
YES
YES
1
Information Flow Enforcement | Object Security and Privacy Attributes
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
2
Information Flow Enforcement | Processing Domains
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
YES
YES
3
Information Flow Enforcement | Dynamic Information Flow Control
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
4
Information Flow Enforcement | Flow Control of Encrypted Information
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
5
Information Flow Enforcement | Embedded Data Types
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
6
Information Flow Enforcement | Metadata
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
7
Information Flow Enforcement | One-way Flow Mechanisms
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
8
Information Flow Enforcement | Security and Privacy Policy Filters
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
9
Information Flow Enforcement | Human Reviews
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
10
Information Flow Enforcement | Enable and Disable Security or Privacy Policy Filters
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
11
Information Flow Enforcement | Configuration of Security or Privacy Policy Filters
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
12
Information Flow Enforcement | Data Type Identifiers
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
13
Information Flow Enforcement | Decomposition into Policy-relevant Subcomponents
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
14
Information Flow Enforcement | Security or Privacy Policy Filter Constraints
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
YES
YES
15
Information Flow Enforcement | Detection of Unsanctioned Information
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
17
Information Flow Enforcement | Domain Authentication
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
19
Information Flow Enforcement | Validation of Metadata
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
20
Information Flow Enforcement | Approved Solutions
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
21
Information Flow Enforcement | Physical or Logical Separation of Information Flows
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
22
Information Flow Enforcement | Access Only
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
23
Information Flow Enforcement | Modify Non-releasable Information
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
24
Information Flow Enforcement | Internal Normalized Format
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
25
Information Flow Enforcement | Data Sanitization
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
26
Information Flow Enforcement | Audit Filtering Actions
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
27
Information Flow Enforcement | Redundant/independent Filtering Mechanisms
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
28
Information Flow Enforcement | Linear Filter Pipelines
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
29
Information Flow Enforcement | Filter Orchestration Engines
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
30
Information Flow Enforcement | Filter Mechanisms Using Multiple Processes
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
31
Information Flow Enforcement | Failed Content Transfer Prevention
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
32
Information Flow Enforcement | Process Requirements for Information Transfer
CM0039
|
CM0038
|
CM0001
|
CM0040
|
CM0050
|
CM0005
NA
NA
AC-5
Separation of Duties
None
NA
NA
AC-6
Least Privilege
CM0052
|
CM0039
|
CM0005
|
CM0038
YES
YES
1
Least Privilege | Authorize Access to Security Functions
CM0005
NA
NA
2
Least Privilege | Non-privileged Access for Nonsecurity Functions
CM0005
NA
NA
3
Least Privilege | Network Access to Privileged Commands
CM0005
NA
NA
4
Least Privilege | Separate Processing Domains
CM0005
NA
NA
5
Least Privilege | Privileged Accounts
CM0005
NA
NA
6
Least Privilege | Privileged Access by Non-organizational Users
CM0005
NA
NA
7
Least Privilege | Review of User Privileges
CM0005
NA
NA
8
Least Privilege | Privilege Levels for Code Execution
CM0005
NA
NA
9
Least Privilege | Log Use of Privileged Functions
CM0005
NA
YES
10
Least Privilege | Prohibit Non-privileged Users from Executing Privileged Functions
CM0005
NA
NA
AC-7
Unsuccessful Logon Attempts
CM0005
NA
NA
2
Unsuccessful Logon Attempts | Purge or Wipe Mobile Device
None
NA
NA
3
Unsuccessful Logon Attempts | Biometric Attempt Limiting
None
NA
NA
4
Unsuccessful Logon Attempts | Use of Alternate Authentication Factor
None
NA
NA
AC-8
System Use Notification
CM0005
NA
NA
AC-9
Previous Logon Notification
None
NA
NA
1
Previous Logon Notification | Unsuccessful Logons
None
NA
NA
2
Previous Logon Notification | Successful and Unsuccessful Logons
None
NA
NA
3
Previous Logon Notification | Notification of Account Changes
None
NA
NA
4
Previous Logon Notification | Additional Logon Information
None
NA
NA
AC-10
Concurrent Session Control
CM0005
NA
NA
AC-11
Device Lock
CM0005
NA
NA
1
Device Lock | Pattern-hiding Displays
CM0005
NA
NA
AC-12
Session Termination
CM0036
|
CM0005
YES
YES
1
Session Termination | User-initiated Logouts
CM0005
NA
YES
2
Session Termination | Termination Message
CM0005
NA
YES
3
Session Termination | Timeout Warning Message
CM0005
NA
NA
AC-14
Permitted Actions Without Identification or Authentication
CM0005
YES
YES
AC-16
Security and Privacy Attributes
CM0005
NA
NA
1
Security and Privacy Attributes | Dynamic Attribute Association
CM0005
NA
NA
2
Security and Privacy Attributes | Attribute Value Changes by Authorized Individuals
CM0005
NA
NA
3
Security and Privacy Attributes | Maintenance of Attribute Associations by System
CM0005
NA
NA
4
Security and Privacy Attributes | Association of Attributes by Authorized Individuals
CM0005
NA
NA
5
Security and Privacy Attributes | Attribute Displays on Objects to Be Output
CM0005
NA
NA
6
Security and Privacy Attributes | Maintenance of Attribute Association
CM0005
NA
NA
7
Security and Privacy Attributes | Consistent Attribute Interpretation
CM0005
NA
NA
8
Security and Privacy Attributes | Association Techniques and Technologies
CM0005
NA
NA
9
Security and Privacy Attributes | Attribute Reassignment — Regrading Mechanisms
CM0005
NA
NA
10
Security and Privacy Attributes | Attribute Configuration by Authorized Individuals
CM0005
NA
NA
AC-17
Remote Access
CM0005
YES
YES
1
Remote Access | Monitoring and Control
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
YES
YES
2
Remote Access | Protection of Confidentiality and Integrity Using Encryption
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
YES
YES
3
Remote Access | Managed Access Control Points
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
NA
NA
4
Remote Access | Privileged Commands and Access
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
NA
YES
6
Remote Access | Protection of Mechanism Information
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
NA
YES
9
Remote Access | Disconnect or Disable Access
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
NA
NA
10
Remote Access | Authenticate Remote Commands
CM0002
|
CM0055
|
CM0005
|
CM0034
|
CM0031
|
CM0033
YES
YES
AC-18
Wireless Access
CM0005
NA
NA
1
Wireless Access | Authentication and Encryption
CM0002
|
CM0031
|
CM0005
|
CM0029
NA
NA
3
Wireless Access | Disable Wireless Networking
CM0002
|
CM0031
|
CM0005
|
CM0029
NA
NA
4
Wireless Access | Restrict Configurations by Users
CM0002
|
CM0031
|
CM0005
|
CM0029
NA
NA
5
Wireless Access | Antennas and Transmission Power Levels
CM0002
|
CM0031
|
CM0005
|
CM0029
NA
NA
AC-19
Access Control for Mobile Devices
CM0005
NA
NA
4
Access Control for Mobile Devices | Restrictions for Classified Information
CM0005
NA
NA
5
Access Control for Mobile Devices | Full Device or Container-based Encryption
CM0005
NA
NA
AC-20
Use of External Systems
CM0005
NA
YES
1
Use of External Systems | Limits on Authorized Use
CM0005
|
CM0024
|
CM0026
|
CM0004
NA
YES
2
Use of External Systems | Portable Storage Devices — Restricted Use
CM0005
|
CM0024
|
CM0026
|
CM0004
NA
NA
3
Use of External Systems | Non-organizationally Owned Systems — Restricted Use
CM0005
|
CM0024
|
CM0026
|
CM0004
NA
YES
4
Use of External Systems | Network Accessible Storage Devices — Prohibited Use
CM0005
|
CM0024
|
CM0026
|
CM0004
NA
NA
5
Use of External Systems | Portable Storage Devices — Prohibited Use
CM0005
|
CM0024
|
CM0026
|
CM0004
NA
NA
AC-21
Information Sharing
CM0005
NA
NA
1
Information Sharing | Automated Decision Support
None
NA
NA
2
Information Sharing | Information Search and Retrieval
None
NA
NA
AC-22
Publicly Accessible Content
CM0005
NA
NA
AC-23
Data Mining Protection
None
NA
NA
AC-24
Access Control Decisions
None
NA
NA
1
Access Control Decisions | Transmit Access Authorization Information
None
NA
NA
2
Access Control Decisions | No User or Process Identity
None
NA
NA
AC-25
Reference Monitor
None
NA
YES
AT-1
Policy and Procedures
None
NA
NA
AT-2
Literacy Training and Awareness
CM0041
|
CM0052
NA
NA
1
Literacy Training and Awareness | Practical Exercises
CM0041
|
CM0052
|
CM0005
NA
NA
2
Literacy Training and Awareness | Insider Threat
CM0041
|
CM0052
|
CM0005
NA
NA
3
Literacy Training and Awareness | Social Engineering and Mining
CM0041
|
CM0052
|
CM0005
NA
NA
4
Literacy Training and Awareness | Suspicious Communications and Anomalous System Behavior
CM0041
|
CM0052
|
CM0005
NA
NA
5
Literacy Training and Awareness | Advanced Persistent Threat
CM0041
|
CM0052
|
CM0005
NA
NA
6
Literacy Training and Awareness | Cyber Threat Environment
CM0041
|
CM0052
|
CM0005
NA
NA
AT-3
Role-based Training
CM0041
|
CM0005
NA
NA
1
Role-based Training | Environmental Controls
CM0005
|
CM0041
NA
NA
2
Role-based Training | Physical Security Controls
CM0005
|
CM0041
NA
NA
3
Role-based Training | Practical Exercises
CM0005
|
CM0041
NA
NA
5
Role-based Training | Processing Personally Identifiable Information
CM0005
|
CM0041
NA
NA
AT-4
Training Records
CM0005
NA
NA
AT-6
Training Feedback
None
NA
NA
AU-1
Policy and Procedures
None
NA
YES
AU-2
Event Logging
CM0005
|
CM0032
YES
YES
AU-3
Content of Audit Records
CM0005
|
CM0032
YES
YES
1
Content of Audit Records | Additional Audit Information
CM0005
|
CM0034
|
CM0032
YES
YES
3
Content of Audit Records | Limit Personally Identifiable Information Elements
CM0005
|
CM0034
|
CM0032
NA
NA
AU-4
Audit Log Storage Capacity
CM0005
|
CM0032
YES
YES
1
Audit Log Storage Capacity | Transfer to Alternate Storage
CM0005
|
CM0032
YES
YES
AU-5
Response to Audit Logging Process Failures
CM0005
|
CM0032
YES
YES
1
Response to Audit Logging Process Failures | Storage Capacity Warning
CM0005
|
CM0032
NA
YES
2
Response to Audit Logging Process Failures | Real-time Alerts
CM0005
|
CM0032
YES
YES
3
Response to Audit Logging Process Failures | Configurable Traffic Volume Thresholds
CM0005
|
CM0032
NA
NA
4
Response to Audit Logging Process Failures | Shutdown on Failure
CM0005
|
CM0032
NA
NA
5
Response to Audit Logging Process Failures | Alternate Audit Logging Capability
CM0005
|
CM0032
YES
YES
AU-6
Audit Record Review, Analysis, and Reporting
CM0052
|
CM0005
YES
YES
1
Audit Record Review, Analysis, and Reporting | Automated Process Integration
CM0005
|
CM0032
YES
YES
3
Audit Record Review, Analysis, and Reporting | Correlate Audit Record Repositories
CM0005
|
CM0032
NA
NA
4
Audit Record Review, Analysis, and Reporting | Central Review and Analysis
CM0005
|
CM0032
YES
YES
5
Audit Record Review, Analysis, and Reporting | Integrated Analysis of Audit Records
CM0005
|
CM0032
NA
NA
6
Audit Record Review, Analysis, and Reporting | Correlation with Physical Monitoring
CM0005
|
CM0032
NA
NA
7
Audit Record Review, Analysis, and Reporting | Permitted Actions
CM0005
|
CM0032
NA
NA
8
Audit Record Review, Analysis, and Reporting | Full Text Analysis of Privileged Commands
CM0005
|
CM0032
NA
NA
9
Audit Record Review, Analysis, and Reporting | Correlation with Information from Nontechnical Sources
CM0005
|
CM0032
NA
NA
AU-7
Audit Record Reduction and Report Generation
CM0052
|
CM0005
NA
NA
1
Audit Record Reduction and Report Generation | Automatic Processing
CM0005
NA
NA
AU-8
Time Stamps
CM0005
|
CM0032
YES
YES
AU-9
Protection of Audit Information
CM0005
|
CM0032
YES
YES
1
Protection of Audit Information | Hardware Write-once Media
CM0005
|
CM0032
NA
NA
2
Protection of Audit Information | Store on Separate Physical Systems or Components
CM0005
|
CM0032
YES
YES
3
Protection of Audit Information | Cryptographic Protection
CM0005
|
CM0032
YES
YES
4
Protection of Audit Information | Access by Subset of Privileged Users
CM0005
|
CM0032
NA
NA
5
Protection of Audit Information | Dual Authorization
CM0005
|
CM0032
NA
YES
6
Protection of Audit Information | Read-only Access
CM0005
|
CM0032
NA
NA
7
Protection of Audit Information | Store on Component with Different Operating System
CM0005
|
CM0032
NA
NA
AU-10
Non-repudiation
CM0052
|
CM0005
NA
NA
1
Non-repudiation | Association of Identities
None
NA
NA
2
Non-repudiation | Validate Binding of Information Producer Identity
None
NA
NA
3
Non-repudiation | Chain of Custody
None
NA
NA
4
Non-repudiation | Validate Binding of Information Reviewer Identity
None
NA
NA
AU-11
Audit Record Retention
CM0005
NA
NA
1
Audit Record Retention | Long-term Retrieval Capability
None
NA
NA
AU-12
Audit Record Generation
CM0052
|
CM0005
YES
YES
1
Audit Record Generation | System-wide and Time-correlated Audit Trail
CM0005
NA
NA
2
Audit Record Generation | Standardized Formats
CM0005
NA
NA
3
Audit Record Generation | Changes by Authorized Individuals
CM0005
NA
YES
4
Audit Record Generation | Query Parameter Audits of Personally Identifiable Information
CM0005
NA
NA
AU-13
Monitoring for Information Disclosure
CM0052
NA
NA
1
Monitoring for Information Disclosure | Use of Automated Tools
None
NA
NA
2
Monitoring for Information Disclosure | Review of Monitored Sites
None
NA
NA
3
Monitoring for Information Disclosure | Unauthorized Replication of Information
None
NA
NA
AU-14
Session Audit
CM0005
|
CM0032
NA
NA
1
Session Audit | System Start-up
CM0005
NA
NA
3
Session Audit | Remote Viewing and Listening
CM0005
NA
NA
AU-16
Cross-organizational Audit Logging
None
NA
NA
1
Cross-organizational Audit Logging | Identity Preservation
None
NA
NA
2
Cross-organizational Audit Logging | Sharing of Audit Information
None
NA
NA
3
Cross-organizational Audit Logging | Disassociability
None
NA
NA
CA-1
Policy and Procedures
None
NA
YES
CA-2
Control Assessments
None
NA
YES
1
Control Assessments | Independent Assessors
None
NA
YES
2
Control Assessments | Specialized Assessments
None
NA
YES
3
Control Assessments | Leveraging Results from External Organizations
None
NA
NA
CA-3
Information Exchange
CM0005
YES
YES
6
Information Exchange | Transfer Authorizations
CM0039
|
CM0005
|
CM0053
|
CM0065
|
CM0055
|
CM0038
YES
YES
7
Information Exchange | Transitive Information Exchanges
CM0039
|
CM0005
|
CM0053
|
CM0065
|
CM0055
|
CM0038
YES
YES
CA-5
Plan of Action and Milestones
None
NA
YES
1
Plan of Action and Milestones | Automation Support for Accuracy and Currency
None
NA
NA
CA-6
Authorization
None
NA
YES
1
Authorization | Joint Authorization — Intra-organization
None
NA
NA
2
Authorization | Joint Authorization — Inter-organization
None
NA
NA
CA-7
Continuous Monitoring
CM0052
|
CM0005
YES
YES
1
Continuous Monitoring | Independent Assessment
CM0005
|
CM0034
|
CM0032
NA
YES
3
Continuous Monitoring | Trend Analyses
CM0005
|
CM0034
|
CM0032
NA
YES
4
Continuous Monitoring | Risk Monitoring
CM0005
|
CM0034
|
CM0032
NA
YES
5
Continuous Monitoring | Consistency Analysis
CM0005
|
CM0034
|
CM0032
NA
YES
6
Continuous Monitoring | Automation Support for Monitoring
CM0005
|
CM0034
|
CM0032
YES
YES
CA-8
Penetration Testing
CM0008
|
CM0004
|
CM0018
|
CM0005
|
CM0053
YES
YES
1
Penetration Testing | Independent Penetration Testing Agent or Team
CM0028
|
CM0053
NA
YES
2
Penetration Testing | Red Team Exercises
CM0028
|
CM0053
NA
NA
3
Penetration Testing | Facility Penetration Testing
CM0028
|
CM0053
NA
NA
CA-9
Internal System Connections
CM0005
NA
YES
1
Internal System Connections | Compliance Checks
None
NA
NA
CM-1
Policy and Procedures
None
NA
YES
CM-2
Baseline Configuration
CM0005
YES
YES
2
Baseline Configuration | Automation Support for Accuracy and Currency
CM0004
|
CM0005
NA
YES
3
Baseline Configuration | Retention of Previous Configurations
CM0004
|
CM0005
NA
NA
6
Baseline Configuration | Development and Test Environments
CM0004
|
CM0005
NA
NA
7
Baseline Configuration | Configure Systems and Components for High-risk Areas
CM0004
|
CM0005
NA
NA
CM-3
Configuration Change Control
CM0005
|
CM0072
NA
YES
1
Configuration Change Control | Automated Documentation, Notification, and Prohibition of Changes
CM0005
|
CM0004
|
CM0010
|
CM0023
NA
YES
2
Configuration Change Control | Testing, Validation, and Documentation of Changes
CM0005
|
CM0004
|
CM0010
|
CM0023
YES
YES
3
Configuration Change Control | Automated Change Implementation
CM0005
|
CM0004
|
CM0010
|
CM0023
NA
NA
4
Configuration Change Control | Security and Privacy Representatives
CM0005
|
CM0004
|
CM0010
|
CM0023
NA
YES
5
Configuration Change Control | Automated Security Response
CM0005
|
CM0004
|
CM0010
|
CM0023
NA
YES
6
Configuration Change Control | Cryptography Management
CM0005
|
CM0004
|
CM0010
|
CM0023
NA
YES
7
Configuration Change Control | Review System Changes
CM0005
|
CM0004
|
CM0010
|
CM0023
YES
YES
8
Configuration Change Control | Prevent or Restrict Configuration Changes
CM0005
|
CM0004
|
CM0010
|
CM0023
YES
YES
CM-4
Impact Analyses
CM0005
YES
YES
1
Impact Analyses | Separate Test Environments
CM0004
|
CM0010
YES
YES
2
Impact Analyses | Verification of Controls
CM0004
|
CM0010
NA
YES
CM-5
Access Restrictions for Change
CM0023
YES
YES
1
Access Restrictions for Change | Automated Access Enforcement and Audit Records
CM0005
NA
YES
4
Access Restrictions for Change | Dual Authorization
CM0005
NA
NA
5
Access Restrictions for Change | Privilege Limitation for Production and Operation
CM0005
NA
YES
6
Access Restrictions for Change | Limit Library Privileges
CM0005
NA
YES
CM-6
Configuration Settings
CM0005
NA
YES
1
Configuration Settings | Automated Management, Application, and Verification
CM0005
NA
NA
2
Configuration Settings | Respond to Unauthorized Changes
CM0005
NA
NA
CM-7
Least Functionality
CM0039
|
CM0047
|
CM0005
YES
YES
1
Least Functionality | Periodic Review
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
NA
YES
2
Least Functionality | Prevent Program Execution
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
NA
YES
3
Least Functionality | Registration Compliance
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
NA
NA
4
Least Functionality | Unauthorized Software
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
NA
NA
5
Least Functionality | Authorized Software
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
YES
YES
6
Least Functionality | Confined Environments with Limited Privileges
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
NA
NA
7
Least Functionality | Code Execution in Protected Environments
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
NA
NA
8
Least Functionality | Binary or Machine Executable Code
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
YES
YES
9
Least Functionality | Prohibiting The Use of Unauthorized Hardware
CM0005
|
CM0010
|
CM0039
|
CM0047
|
CM0069
|
CM0004
|
CM0015
|
CM0024
|
CM0028
YES
YES
CM-8
System Component Inventory
CM0012
|
CM0005
YES
YES
1
System Component Inventory | Updates During Installation and Removal
CM0005
|
CM0012
NA
YES
2
System Component Inventory | Automated Maintenance
CM0005
|
CM0012
NA
YES
3
System Component Inventory | Automated Unauthorized Component Detection
CM0005
|
CM0012
NA
YES
4
System Component Inventory | Accountability Information
CM0005
|
CM0012
NA
YES
6
System Component Inventory | Assessed Configurations and Approved Deviations
CM0005
|
CM0012
NA
NA
7
System Component Inventory | Centralized Repository
CM0005
|
CM0012
NA
NA
8
System Component Inventory | Automated Location Tracking
CM0005
|
CM0012
NA
NA
9
System Component Inventory | Assignment of Components to Systems
CM0005
|
CM0012
NA
NA
CM-9
Configuration Management Plan
CM0005
NA
YES
1
Configuration Management Plan | Assignment of Responsibility
None
NA
NA
CM-10
Software Usage Restrictions
None
YES
YES
1
Software Usage Restrictions | Open-source Software
CM0011
|
CM0012
|
CM0013
|
CM0005
YES
YES
CM-11
User-installed Software
CM0005
NA
NA
2
User-installed Software | Software Installation with Privileged Status
CM0005
|
CM0012
|
CM0021
|
CM0023
|
CM0047
|
CM0032
NA
NA
3
User-installed Software | Automated Enforcement and Monitoring
CM0005
|
CM0012
|
CM0021
|
CM0023
|
CM0047
|
CM0032
NA
NA
CM-12
Information Location
CM0001
|
CM0005
NA
YES
1
Information Location | Automated Tools to Support Information Location
CM0001
|
CM0005
NA
YES
CM-13
Data Action Mapping
None
NA
NA
CM-14
Signed Components
CM0004
|
CM0015
|
CM0021
|
CM0005
YES
YES
CP-1
Policy and Procedures
None
NA
YES
CP-2
Contingency Plan
CM0005
YES
YES
1
Contingency Plan | Coordinate with Related Plans
CM0005
|
CM0044
|
CM0022
|
CM0004
YES
YES
2
Contingency Plan | Capacity Planning
CM0005
|
CM0044
|
CM0022
|
CM0004
NA
YES
3
Contingency Plan | Resume Mission and Business Functions
CM0005
|
CM0044
|
CM0022
|
CM0004
YES
YES
5
Contingency Plan | Continue Mission and Business Functions
CM0005
|
CM0044
|
CM0022
|
CM0004
YES
YES
6
Contingency Plan | Alternate Processing and Storage Sites
CM0005
|
CM0044
|
CM0022
|
CM0004
NA
YES
7
Contingency Plan | Coordinate with External Service Providers
CM0005
|
CM0044
|
CM0022
|
CM0004
YES
YES
8
Contingency Plan | Identify Critical Assets
CM0005
|
CM0044
|
CM0022
|
CM0004
YES
YES
CP-3
Contingency Training
None
NA
NA
1
Contingency Training | Simulated Events
CM0005
NA
NA
2
Contingency Training | Mechanisms Used in Training Environments
CM0005
NA
NA
CP-4
Contingency Plan Testing
None
NA
YES
1
Contingency Plan Testing | Coordinate with Related Plans
CM0018
|
CM0005
|
CM0042
|
CM0051
NA
YES
2
Contingency Plan Testing | Alternate Processing Site
CM0018
|
CM0005
|
CM0042
|
CM0051
NA
YES
3
Contingency Plan Testing | Automated Testing
CM0018
|
CM0005
|
CM0042
|
CM0051
NA
NA
4
Contingency Plan Testing | Full Recovery and Reconstitution
CM0018
|
CM0005
|
CM0042
|
CM0051
NA
YES
5
Contingency Plan Testing | Self-challenge
CM0018
|
CM0005
|
CM0042
|
CM0051
YES
YES
CP-6
Alternate Storage Site
None
NA
NA
1
Alternate Storage Site | Separation from Primary Site
None
NA
NA
2
Alternate Storage Site | Recovery Time and Recovery Point Objectives
None
NA
NA
3
Alternate Storage Site | Accessibility
None
NA
NA
CP-7
Alternate Processing Site
None
NA
NA
1
Alternate Processing Site | Separation from Primary Site
None
NA
NA
2
Alternate Processing Site | Accessibility
None
NA
NA
3
Alternate Processing Site | Priority of Service
None
NA
NA
4
Alternate Processing Site | Preparation for Use
None
NA
NA
6
Alternate Processing Site | Inability to Return to Primary Site
None
NA
NA
CP-8
Telecommunications Services
CM0005
|
CM0029
NA
NA
1
Telecommunications Services | Priority of Service Provisions
CM0005
|
CM0070
NA
NA
2
Telecommunications Services | Single Points of Failure
CM0005
|
CM0070
NA
NA
3
Telecommunications Services | Separation of Primary and Alternate Providers
CM0005
|
CM0070
NA
NA
4
Telecommunications Services | Provider Contingency Plan
CM0005
|
CM0070
NA
NA
5
Telecommunications Services | Alternate Telecommunication Service Testing
CM0005
|
CM0070
NA
NA
CP-9
System Backup
CM0005
|
CM0056
NA
NA
1
System Backup | Testing for Reliability and Integrity
CM0005
NA
NA
2
System Backup | Test Restoration Using Sampling
CM0005
NA
NA
3
System Backup | Separate Storage for Critical Information
CM0005
NA
NA
5
System Backup | Transfer to Alternate Storage Site
CM0005
NA
NA
6
System Backup | Redundant Secondary System
CM0005
NA
NA
7
System Backup | Dual Authorization
CM0005
NA
NA
8
System Backup | Cryptographic Protection
CM0005
NA
NA
CP-10
System Recovery and Reconstitution
CM0005
|
CM0032
|
CM0044
YES
YES
2
System Recovery and Reconstitution | Transaction Recovery
CM0005
|
CM0032
|
CM0044
NA
NA
4
System Recovery and Reconstitution | Restore Within Time Period
CM0005
|
CM0032
|
CM0044
YES
YES
6
System Recovery and Reconstitution | Component Protection
CM0005
|
CM0032
|
CM0044
YES
YES
CP-11
Alternate Communications Protocols
CM0072
NA
NA
CP-12
Safe Mode
CM0006
|
CM0044
YES
YES
CP-13
Alternative Security Mechanisms
None
YES
YES
IA-1
Policy and Procedures
None
NA
YES
IA-2
Identification and Authentication (organizational Users)
CM0005
NA
NA
1
Identification and Authentication (organizational Users) | Multi-factor Authentication to Privileged Accounts
CM0005
|
CM0065
|
CM0033
NA
NA
2
Identification and Authentication (organizational Users) | Multi-factor Authentication to Non-privileged Accounts
CM0005
|
CM0065
|
CM0033
NA
NA
5
Identification and Authentication (organizational Users) | Individual Authentication with Group Authentication
CM0005
|
CM0065
|
CM0033
NA
NA
6
Identification and Authentication (organizational Users) | Access to Accounts — Separate Device
CM0005
|
CM0065
|
CM0033
NA
NA
8
Identification and Authentication (organizational Users) | Access to Accounts — Replay Resistant
CM0005
|
CM0065
|
CM0033
NA
NA
10
Identification and Authentication (organizational Users) | Single Sign-on
CM0005
|
CM0065
|
CM0033
NA
NA
12
Identification and Authentication (organizational Users) | Acceptance of PIV Credentials
CM0005
|
CM0065
|
CM0033
NA
NA
13
Identification and Authentication (organizational Users) | Out-of-band Authentication
CM0005
|
CM0065
|
CM0033
NA
NA
IA-3
Device Identification and Authentication
CM0033
|
CM0005
YES
YES
1
Device Identification and Authentication | Cryptographic Bidirectional Authentication
CM0031
|
CM0033
|
CM0005
YES
YES
3
Device Identification and Authentication | Dynamic Address Allocation
CM0031
|
CM0033
|
CM0005
NA
NA
4
Device Identification and Authentication | Device Attestation
CM0031
|
CM0033
|
CM0005
NA
NA
IA-4
Identifier Management
CM0052
|
CM0031
|
CM0033
|
CM0005
YES
YES
1
Identifier Management | Prohibit Account Identifiers as Public Identifiers
CM0002
|
CM0031
|
CM0005
|
CM0035
NA
NA
4
Identifier Management | Identify User Status
CM0002
|
CM0031
|
CM0005
|
CM0035
NA
NA
5
Identifier Management | Dynamic Management
CM0002
|
CM0031
|
CM0005
|
CM0035
NA
NA
6
Identifier Management | Cross-organization Management
CM0002
|
CM0031
|
CM0005
|
CM0035
NA
NA
8
Identifier Management | Pairwise Pseudonymous Identifiers
CM0002
|
CM0031
|
CM0005
|
CM0035
NA
NA
9
Identifier Management | Attribute Maintenance and Protection
CM0002
|
CM0031
|
CM0005
|
CM0035
YES
YES
IA-5
Authenticator Management
CM0002
|
CM0005
|
CM0035
YES
YES
1
Authenticator Management | Password-based Authentication
CM0005
|
CM0002
NA
NA
2
Authenticator Management | Public Key-based Authentication
CM0005
|
CM0002
NA
NA
5
Authenticator Management | Change Authenticators Prior to Delivery
CM0005
|
CM0002
NA
NA
6
Authenticator Management | Protection of Authenticators
CM0005
|
CM0002
NA
YES
7
Authenticator Management | No Embedded Unencrypted Static Authenticators
CM0005
|
CM0002
YES
YES
8
Authenticator Management | Multiple System Accounts
CM0005
|
CM0002
NA
NA
9
Authenticator Management | Federated Credential Management
CM0005
|
CM0002
NA
NA
10
Authenticator Management | Dynamic Credential Binding
CM0005
|
CM0002
NA
NA
12
Authenticator Management | Biometric Authentication Performance
CM0005
|
CM0002
NA
NA
13
Authenticator Management | Expiration of Cached Authenticators
CM0005
|
CM0002
NA
NA
14
Authenticator Management | Managing Content of PKI Trust Stores
CM0005
|
CM0002
NA
NA
15
Authenticator Management | Gsa-approved Products and Services
CM0005
|
CM0002
NA
NA
16
Authenticator Management | In-person or Trusted External Party Authenticator Issuance
CM0005
|
CM0002
NA
NA
17
Authenticator Management | Presentation Attack Detection for Biometric Authenticators
CM0005
|
CM0002
NA
NA
18
Authenticator Management | Password Managers
CM0005
|
CM0002
NA
NA
IA-6
Authentication Feedback
CM0005
NA
NA
IA-7
Cryptographic Module Authentication
CM0002
|
CM0031
|
CM0033
|
CM0005
YES
YES
IA-8
Identification and Authentication (non-organizational Users)
CM0005
NA
NA
1
Identification and Authentication (non-organizational Users) | Acceptance of PIV Credentials from Other Agencies
None
NA
NA
2
Identification and Authentication (non-organizational Users) | Acceptance of External Authenticators
None
NA
NA
4
Identification and Authentication (non-organizational Users) | Use of Defined Profiles
None
NA
NA
5
Identification and Authentication (non-organizational Users) | Acceptance of PIV-I Credentials
None
NA
NA
6
Identification and Authentication (non-organizational Users) | Disassociability
None
NA
NA
IA-9
Service Identification and Authentication
None
NA
YES
IA-10
Adaptive Authentication
None
NA
YES
IA-11
Re-authentication
CM0005
NA
NA
IA-12
Identity Proofing
CM0052
|
CM0054
|
CM0005
NA
NA
1
Identity Proofing | Supervisor Authorization
CM0052
|
CM0054
|
CM0005
NA
NA
2
Identity Proofing | Identity Evidence
CM0052
|
CM0054
|
CM0005
NA
NA
3
Identity Proofing | Identity Evidence Validation and Verification
CM0052
|
CM0054
|
CM0005
NA
NA
4
Identity Proofing | In-person Validation and Verification
CM0052
|
CM0054
|
CM0005
NA
NA
5
Identity Proofing | Address Confirmation
CM0052
|
CM0054
|
CM0005
NA
NA
6
Identity Proofing | Accept Externally-proofed Identities
CM0052
|
CM0054
|
CM0005
NA
NA
IR-1
Policy and Procedures
None
NA
YES
IR-2
Incident Response Training
CM0005
NA
NA
1
Incident Response Training | Simulated Events
CM0005
|
CM0041
|
CM0052
NA
NA
2
Incident Response Training | Automated Training Environments
CM0005
|
CM0041
|
CM0052
NA
NA
3
Incident Response Training | Breach
CM0005
|
CM0041
|
CM0052
NA
NA
IR-3
Incident Response Testing
None
NA
YES
1
Incident Response Testing | Automated Testing
CM0005
NA
NA
2
Incident Response Testing | Coordination with Related Plans
CM0005
NA
YES
3
Incident Response Testing | Continuous Improvement
CM0005
NA
NA
IR-4
Incident Handling
CM0052
|
CM0005
|
CM0032
|
CM0044
YES
YES
1
Incident Handling | Automated Incident Handling Processes
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
YES
2
Incident Handling | Dynamic Reconfiguration
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
3
Incident Handling | Continuity of Operations
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
YES
YES
4
Incident Handling | Information Correlation
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
5
Incident Handling | Automatic Disabling of System
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
6
Incident Handling | Insider Threats
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
YES
YES
7
Incident Handling | Insider Threats — Intra-organization Coordination
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
8
Incident Handling | Correlation with External Organizations
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
9
Incident Handling | Dynamic Response Capability
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
10
Incident Handling | Supply Chain Coordination
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
YES
11
Incident Handling | Integrated Incident Response Team
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
12
Incident Handling | Malicious Code and Forensic Analysis
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
YES
YES
13
Incident Handling | Behavior Analysis
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
YES
14
Incident Handling | Security Operations Center
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
15
Incident Handling | Public Relations and Reputation Repair
CM0005
|
CM0044
|
CM0032
|
CM0052
|
CM0034
NA
NA
IR-5
Incident Monitoring
CM0005
|
CM0032
|
CM0068
YES
YES
1
Incident Monitoring | Automated Tracking, Data Collection, and Analysis
CM0005
|
CM0032
|
CM0068
YES
YES
IR-6
Incident Reporting
CM0005
NA
YES
1
Incident Reporting | Automated Reporting
CM0005
NA
NA
2
Incident Reporting | Vulnerabilities Related to Incidents
CM0005
NA
YES
3
Incident Reporting | Supply Chain Coordination
CM0005
NA
NA
IR-7
Incident Response Assistance
CM0005
NA
NA
1
Incident Response Assistance | Automation Support for Availability of Information and Support
CM0005
NA
NA
2
Incident Response Assistance | Coordination with External Providers
CM0005
NA
NA
IR-8
Incident Response Plan
None
NA
YES
1
Incident Response Plan | Breaches
None
NA
NA
IR-9
Information Spillage Response
None
NA
NA
2
Information Spillage Response | Training
None
NA
NA
3
Information Spillage Response | Post-spill Operations
None
NA
NA
4
Information Spillage Response | Exposure to Unauthorized Personnel
None
NA
NA
MA-1
Policy and Procedures
None
NA
NA
MA-2
Controlled Maintenance
CM0005
NA
NA
2
Controlled Maintenance | Automated Maintenance Activities
None
NA
NA
MA-3
Maintenance Tools
CM0005
NA
NA
1
Maintenance Tools | Inspect Tools
CM0005
NA
NA
2
Maintenance Tools | Inspect Media
CM0005
NA
NA
3
Maintenance Tools | Prevent Unauthorized Removal
CM0005
NA
NA
4
Maintenance Tools | Restricted Tool Use
CM0005
NA
NA
5
Maintenance Tools | Execution with Privilege
CM0005
NA
NA
6
Maintenance Tools | Software Updates and Patches
CM0005
NA
NA
MA-4
Nonlocal Maintenance
CM0005
NA
NA
1
Nonlocal Maintenance | Logging and Review
CM0005
NA
NA
3
Nonlocal Maintenance | Comparable Security and Sanitization
CM0005
NA
NA
4
Nonlocal Maintenance | Authentication and Separation of Maintenance Sessions
CM0005
NA
NA
5
Nonlocal Maintenance | Approvals and Notifications
CM0005
NA
NA
6
Nonlocal Maintenance | Cryptographic Protection
CM0005
NA
NA
7
Nonlocal Maintenance | Disconnect Verification
CM0005
NA
NA
MA-5
Maintenance Personnel
None
NA
NA
1
Maintenance Personnel | Individuals Without Appropriate Access
CM0005
NA
NA
2
Maintenance Personnel | Security Clearances for Classified Systems
CM0005
NA
NA
3
Maintenance Personnel | Citizenship Requirements for Classified Systems
CM0005
NA
NA
4
Maintenance Personnel | Foreign Nationals
CM0005
NA
NA
5
Maintenance Personnel | Non-system Maintenance
CM0005
NA
NA
MA-6
Timely Maintenance
CM0005
NA
NA
1
Timely Maintenance | Preventive Maintenance
None
NA
NA
2
Timely Maintenance | Predictive Maintenance
None
NA
NA
3
Timely Maintenance | Automated Support for Predictive Maintenance
None
NA
NA
MA-7
Field Maintenance
CM0028
|
CM0052
|
CM0004
|
CM0023
|
CM0005
|
CM0037
NA
NA
MP-1
Policy and Procedures
None
NA
NA
MP-2
Media Access
CM0005
NA
NA
MP-3
Media Marking
CM0005
NA
NA
MP-4
Media Storage
CM0005
NA
NA
2
Media Storage | Automated Restricted Access
None
NA
NA
MP-5
Media Transport
CM0005
NA
NA
3
Media Transport | Custodians
None
NA
NA
MP-6
Media Sanitization
CM0005
NA
NA
1
Media Sanitization | Review, Approve, Track, Document, and Verify
CM0005
NA
NA
2
Media Sanitization | Equipment Testing
CM0005
NA
NA
3
Media Sanitization | Nondestructive Techniques
CM0005
NA
NA
7
Media Sanitization | Dual Authorization
CM0005
NA
NA
8
Media Sanitization | Remote Purging or Wiping of Information
CM0005
NA
NA
MP-7
Media Use
CM0052
|
CM0005
NA
NA
2
Media Use | Prohibit Use of Sanitization-resistant Media
None
NA
NA
MP-8
Media Downgrading
None
NA
NA
1
Media Downgrading | Documentation of Process
None
NA
NA
2
Media Downgrading | Equipment Testing
None
NA
NA
3
Media Downgrading | Controlled Unclassified Information
None
NA
NA
4
Media Downgrading | Classified Information
None
NA
NA
PE-1
Policy and Procedures
None
NA
YES
PE-2
Physical Access Authorizations
CM0052
|
CM0053
NA
NA
1
Physical Access Authorizations | Access by Position or Role
CM0053
NA
NA
2
Physical Access Authorizations | Two Forms of Identification
CM0053
NA
NA
3
Physical Access Authorizations | Restrict Unescorted Access
CM0053
NA
NA
PE-3
Physical Access Control
CM0054
|
CM0053
NA
NA
1
Physical Access Control | System Access
CM0053
|
CM0005
NA
NA
2
Physical Access Control | Facility and Systems
CM0053
|
CM0005
NA
NA
3
Physical Access Control | Continuous Guards
CM0053
|
CM0005
NA
NA
4
Physical Access Control | Lockable Casings
CM0053
|
CM0005
NA
NA
5
Physical Access Control | Tamper Protection
CM0053
|
CM0005
NA
NA
7
Physical Access Control | Physical Barriers
CM0053
|
CM0005
NA
NA
8
Physical Access Control | Access Control Vestibules
CM0053
|
CM0005
NA
NA
PE-4
Access Control for Transmission
CM0071
NA
NA
PE-5
Access Control for Output Devices
None
NA
NA
2
Access Control for Output Devices | Link to Individual Identity
None
NA
NA
PE-6
Monitoring Physical Access
None
YES
YES
1
Monitoring Physical Access | Intrusion Alarms and Surveillance Equipment
None
NA
YES
2
Monitoring Physical Access | Automated Intrusion Recognition and Responses
None
NA
YES
3
Monitoring Physical Access | Video Surveillance
None
NA
NA
4
Monitoring Physical Access | Monitoring Physical Access to Systems
None
NA
YES
PE-8
Visitor Access Records
None
NA
NA
1
Visitor Access Records | Automated Records Maintenance and Review
None
NA
NA
3
Visitor Access Records | Limit Personally Identifiable Information Elements
None
NA
NA
PE-9
Power Equipment and Cabling
None
NA
YES
1
Power Equipment and Cabling | Redundant Cabling
None
NA
NA
2
Power Equipment and Cabling | Automatic Voltage Controls
None
NA
NA
PE-10
Emergency Shutoff
None
YES
YES
PE-11
Emergency Power
None
NA
YES
1
Emergency Power | Alternate Power Supply — Minimal Operational Capability
None
NA
YES
2
Emergency Power | Alternate Power Supply — Self-contained
None
NA
NA
PE-12
Emergency Lighting
None
NA
NA
1
Emergency Lighting | Essential Mission and Business Functions
None
NA
NA
PE-13
Fire Protection
None
NA
NA
1
Fire Protection | Detection Systems – Automatic Activation and Notification
None
NA
NA
2
Fire Protection | Suppression Systems – Automatic Activation and Notification
None
NA
NA
4
Fire Protection | Inspections
None
NA
NA
PE-14
Environmental Controls
None
NA
YES
1
Environmental Controls | Automatic Controls
None
NA
NA
2
Environmental Controls | Monitoring with Alarms and Notifications
None
NA
NA
PE-15
Water Damage Protection
None
NA
NA
1
Water Damage Protection | Automation Support
None
NA
NA
PE-16
Delivery and Removal
None
NA
NA
PE-17
Alternate Work Site
None
NA
NA
PE-18
Location of System Components
None
NA
YES
PE-19
Information Leakage
CM0003
|
CM0062
|
CM0057
|
CM0058
|
CM0059
|
CM0060
|
CM0061
|
CM0063
|
CM0064
NA
YES
1
Information Leakage | National Emissions and Tempest Policies and Procedures
CM0003
|
CM0062
|
CM0057
|
CM0058
|
CM0059
|
CM0060
|
CM0061
|
CM0063
|
CM0064
NA
YES
PE-20
Asset Monitoring and Tracking
None
YES
YES
PE-21
Electromagnetic Pulse Protection
CM0003
YES
YES
PE-22
Component Marking
None
NA
NA
PE-23
Facility Location
None
NA
NA
PL-1
Policy and Procedures
None
NA
YES
PL-2
System Security and Privacy Plans
None
NA
YES
PL-4
Rules of Behavior
None
NA
NA
1
Rules of Behavior | Social Media and External Site/application Usage Restrictions
None
NA
NA
PL-7
Concept of Operations
None
NA
YES
PL-8
Security and Privacy Architectures
CM0005
YES
YES
1
Security and Privacy Architectures | Defense in Depth
CM0005
|
CM0004
YES
YES
2
Security and Privacy Architectures | Supplier Diversity
CM0005
|
CM0004
YES
YES
PL-9
Central Management
CM0005
NA
NA
PL-10
Baseline Selection
CM0005
NA
YES
PL-11
Baseline Tailoring
CM0005
NA
YES
PM-1
Information Security Program Plan
None
NA
YES
PM-2
Information Security Program Leadership Role
None
NA
NA
PM-3
Information Security and Privacy Resources
None
NA
NA
PM-4
Plan of Action and Milestones Process
None
NA
NA
PM-5
System Inventory
None
NA
NA
1
System Inventory | Inventory of Personally Identifiable Information
None
NA
NA
PM-6
Measures of Performance
None
NA
NA
PM-7
Enterprise Architecture
None
NA
NA
1
Enterprise Architecture | Offloading
None
NA
NA
PM-8
Critical Infrastructure Plan
None
NA
NA
PM-9
Risk Management Strategy
None
NA
NA
PM-10
Authorization Process
None
NA
NA
PM-11
Mission and Business Process Definition
CM0001
|
CM0022
|
CM0005
YES
YES
PM-12
Insider Threat Program
CM0052
YES
YES
PM-13
Security and Privacy Workforce
None
NA
NA
PM-14
Testing, Training, and Monitoring
CM0052
YES
YES
PM-15
Security and Privacy Groups and Associations
None
NA
NA
PM-16
Threat Awareness Program
CM0009
YES
YES
1
Threat Awareness Program | Automated Means for Sharing Threat Intelligence
CM0009
|
CM0005
YES
YES
PM-17
Protecting Controlled Unclassified Information on External Systems
CM0001
|
CM0022
|
CM0005
YES
YES
PM-18
Privacy Program Plan
None
NA
NA
PM-19
Privacy Program Leadership Role
None
NA
NA
PM-20
Dissemination of Privacy Program Information
None
NA
NA
1
Dissemination of Privacy Program Information | Privacy Policies on Websites, Applications, and Digital Services
None
NA
NA
PM-21
Accounting of Disclosures
None
NA
NA
PM-22
Personally Identifiable Information Quality Management
None
NA
NA
PM-23
Data Governance Body
None
NA
NA
PM-24
Data Integrity Board
None
NA
NA
PM-25
Minimization of Personally Identifiable Information Used in Testing, Training, and Research
None
NA
NA
PM-26
Complaint Management
None
NA
NA
PM-27
Privacy Reporting
None
NA
NA
PM-28
Risk Framing
None
NA
NA
PM-29
Risk Management Program Leadership Roles
None
NA
NA
PM-30
Supply Chain Risk Management Strategy
CM0022
|
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
1
Supply Chain Risk Management Strategy | Suppliers of Critical or Mission-essential Items
CM0022
|
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
PM-31
Continuous Monitoring Strategy
CM0005
NA
YES
PM-32
Purposing
CM0022
|
CM0005
YES
YES
PS-1
Policy and Procedures
None
NA
NA
PS-2
Position Risk Designation
None
NA
NA
PS-3
Personnel Screening
CM0052
NA
NA
1
Personnel Screening | Classified Information
None
NA
NA
2
Personnel Screening | Formal Indoctrination
None
NA
NA
3
Personnel Screening | Information with Special Protective Measures
None
NA
NA
4
Personnel Screening | Citizenship Requirements
None
NA
NA
PS-4
Personnel Termination
CM0052
NA
NA
1
Personnel Termination | Post-employment Requirements
None
NA
NA
2
Personnel Termination | Automated Actions
None
NA
NA
PS-5
Personnel Transfer
CM0052
NA
NA
PS-6
Access Agreements
None
NA
NA
2
Access Agreements | Classified Information Requiring Special Protection
None
NA
NA
3
Access Agreements | Post-employment Requirements
None
NA
NA
PS-7
External Personnel Security
None
NA
NA
PS-8
Personnel Sanctions
CM0052
NA
NA
PS-9
Position Descriptions
None
NA
NA
PT-1
Policy and Procedures
None
NA
NA
PT-2
Authority to Process Personally Identifiable Information
None
NA
NA
1
Authority to Process Personally Identifiable Information | Data Tagging
None
NA
NA
2
Authority to Process Personally Identifiable Information | Automation
None
NA
NA
PT-3
Personally Identifiable Information Processing Purposes
None
NA
NA
1
Personally Identifiable Information Processing Purposes | Data Tagging
None
NA
NA
2
Personally Identifiable Information Processing Purposes | Automation
None
NA
NA
PT-4
Consent
None
NA
NA
1
Consent | Tailored Consent
None
NA
NA
2
Consent | Just-in-time Consent
None
NA
NA
3
Consent | Revocation
None
NA
NA
PT-5
Privacy Notice
None
NA
NA
1
Privacy Notice | Just-in-time Notice
None
NA
NA
2
Privacy Notice | Privacy Act Statements
None
NA
NA
PT-6
System of Records Notice
None
NA
NA
1
System of Records Notice | Routine Uses
None
NA
NA
2
System of Records Notice | Exemption Rules
None
NA
NA
PT-7
Specific Categories of Personally Identifiable Information
None
NA
NA
1
Specific Categories of Personally Identifiable Information | Social Security Numbers
None
NA
NA
2
Specific Categories of Personally Identifiable Information | First Amendment Information
None
NA
NA
PT-8
Computer Matching Requirements
None
NA
NA
RA-1
Policy and Procedures
None
NA
YES
RA-2
Security Categorization
None
NA
YES
1
Security Categorization | Impact-level Prioritization
None
NA
NA
RA-3
Risk Assessment
None
YES
YES
1
Risk Assessment | Supply Chain Risk Assessment
CM0022
|
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
|
CM0009
|
CM0032
YES
YES
2
Risk Assessment | Use of All-source Intelligence
CM0022
|
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
|
CM0009
|
CM0032
YES
YES
3
Risk Assessment | Dynamic Threat Awareness
CM0022
|
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
|
CM0009
|
CM0032
YES
YES
4
Risk Assessment | Predictive Cyber Analytics
CM0022
|
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
|
CM0009
|
CM0032
YES
YES
RA-5
Vulnerability Monitoring and Scanning
CM0008
|
CM0004
|
CM0011
|
CM0013
|
CM0016
|
CM0019
|
CM0005
YES
YES
2
Vulnerability Monitoring and Scanning | Update Vulnerabilities to Be Scanned
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
YES
3
Vulnerability Monitoring and Scanning | Breadth and Depth of Coverage
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
YES
YES
4
Vulnerability Monitoring and Scanning | Discoverable Information
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
YES
5
Vulnerability Monitoring and Scanning | Privileged Access
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
YES
6
Vulnerability Monitoring and Scanning | Automated Trend Analyses
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
NA
8
Vulnerability Monitoring and Scanning | Review Historic Audit Logs
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
NA
10
Vulnerability Monitoring and Scanning | Correlate Scanning Information
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
NA
11
Vulnerability Monitoring and Scanning | Public Disclosure Program
CM0004
|
CM0005
|
CM0011
|
CM0008
|
CM0012
|
CM0018
NA
NA
RA-6
Technical Surveillance Countermeasures Survey
None
YES
YES
RA-7
Risk Response
CM0005
NA
YES
RA-8
Privacy Impact Assessments
None
NA
NA
RA-9
Criticality Analysis
CM0022
|
CM0004
|
CM0005
YES
YES
RA-10
Threat Hunting
CM0009
|
CM0052
|
CM0005
|
CM0032
YES
YES
SA-1
Policy and Procedures
None
NA
YES
SA-2
Allocation of Resources
CM0005
YES
YES
SA-3
System Development Life Cycle
CM0004
|
CM0005
YES
YES
1
System Development Life Cycle | Manage Preproduction Environment
CM0001
|
CM0004
|
CM0005
NA
YES
2
System Development Life Cycle | Use of Live or Operational Data
CM0001
|
CM0004
|
CM0005
NA
YES
3
System Development Life Cycle | Technology Refresh
CM0001
|
CM0004
|
CM0005
NA
NA
SA-4
Acquisition Process
CM0005
NA
YES
1
Acquisition Process | Functional Properties of Controls
CM0005
|
CM0004
|
CM0001
NA
YES
2
Acquisition Process | Design and Implementation Information for Controls
CM0005
|
CM0004
|
CM0001
NA
YES
3
Acquisition Process | Development Methods, Techniques, and Practices
CM0005
|
CM0004
|
CM0001
NA
YES
5
Acquisition Process | System, Component, and Service Configurations
CM0005
|
CM0004
|
CM0001
YES
YES
6
Acquisition Process | Use of Information Assurance Products
CM0005
|
CM0004
|
CM0001
NA
NA
7
Acquisition Process | Niap-approved Protection Profiles
CM0005
|
CM0004
|
CM0001
NA
NA
8
Acquisition Process | Continuous Monitoring Plan for Controls
CM0005
|
CM0004
|
CM0001
NA
NA
9
Acquisition Process | Functions, Ports, Protocols, and Services in Use
CM0005
|
CM0004
|
CM0001
YES
YES
10
Acquisition Process | Use of Approved PIV Products
CM0005
|
CM0004
|
CM0001
NA
NA
11
Acquisition Process | System of Records
CM0005
|
CM0004
|
CM0001
NA
NA
12
Acquisition Process | Data Ownership
CM0005
|
CM0004
|
CM0001
NA
YES
SA-5
System Documentation
CM0001
|
CM0008
|
CM0007
|
CM0005
YES
YES
SA-8
Security and Privacy Engineering Principles
CM0005
YES
YES
1
Security and Privacy Engineering Principles | Clear Abstractions
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
2
Security and Privacy Engineering Principles | Least Common Mechanism
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
3
Security and Privacy Engineering Principles | Modularity and Layering
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
NA
4
Security and Privacy Engineering Principles | Partially Ordered Dependencies
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
NA
5
Security and Privacy Engineering Principles | Efficiently Mediated Access
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
6
Security and Privacy Engineering Principles | Minimized Sharing
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
7
Security and Privacy Engineering Principles | Reduced Complexity
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
8
Security and Privacy Engineering Principles | Secure Evolvability
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
9
Security and Privacy Engineering Principles | Trusted Components
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
10
Security and Privacy Engineering Principles | Hierarchical Trust
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
11
Security and Privacy Engineering Principles | Inverse Modification Threshold
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
12
Security and Privacy Engineering Principles | Hierarchical Protection
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
13
Security and Privacy Engineering Principles | Minimized Security Elements
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
14
Security and Privacy Engineering Principles | Least Privilege
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
15
Security and Privacy Engineering Principles | Predicate Permission
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
16
Security and Privacy Engineering Principles | Self-reliant Trustworthiness
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
17
Security and Privacy Engineering Principles | Secure Distributed Composition
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
18
Security and Privacy Engineering Principles | Trusted Communications Channels
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
19
Security and Privacy Engineering Principles | Continuous Protection
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
20
Security and Privacy Engineering Principles | Secure Metadata Management
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
21
Security and Privacy Engineering Principles | Self-analysis
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
22
Security and Privacy Engineering Principles | Accountability and Traceability
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
23
Security and Privacy Engineering Principles | Secure Defaults
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
24
Security and Privacy Engineering Principles | Secure Failure and Recovery
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
YES
YES
25
Security and Privacy Engineering Principles | Economic Security
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
26
Security and Privacy Engineering Principles | Performance Security
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
27
Security and Privacy Engineering Principles | Human Factored Security
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
28
Security and Privacy Engineering Principles | Acceptable Security
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
29
Security and Privacy Engineering Principles | Repeatable and Documented Procedures
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
30
Security and Privacy Engineering Principles | Procedural Rigor
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
31
Security and Privacy Engineering Principles | Secure System Modification
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
YES
32
Security and Privacy Engineering Principles | Sufficient Documentation
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
33
Security and Privacy Engineering Principles | Minimization
CM0031
|
CM0050
|
CM0013
|
CM0039
|
CM0005
|
CM0038
|
CM0002
|
CM0032
|
CM0044
|
CM0042
NA
NA
SA-9
External System Services
CM0005
YES
YES
1
External System Services | Risk Assessments and Organizational Approvals
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
NA
2
External System Services | Identification of Functions, Ports, Protocols, and Services
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
YES
3
External System Services | Establish and Maintain Trust Relationship with Providers
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
NA
4
External System Services | Consistent Interests of Consumers and Providers
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
NA
5
External System Services | Processing, Storage, and Service Location
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
NA
6
External System Services | Organization-controlled Cryptographic Keys
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
YES
YES
7
External System Services | Organization-controlled Integrity Checking
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
NA
8
External System Services | Processing and Storage Location — U.s. Jurisdiction
CM0005
|
CM0002
|
CM0030
|
CM0050
|
CM0001
NA
NA
SA-10
Developer Configuration Management
CM0004
|
CM0023
|
CM0005
YES
YES
1
Developer Configuration Management | Software and Firmware Integrity Verification
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
YES
YES
2
Developer Configuration Management | Alternative Configuration Management
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
NA
YES
3
Developer Configuration Management | Hardware Integrity Verification
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
YES
YES
4
Developer Configuration Management | Trusted Generation
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
YES
YES
5
Developer Configuration Management | Mapping Integrity for Version Control
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
NA
NA
6
Developer Configuration Management | Trusted Distribution
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
NA
NA
7
Developer Configuration Management | Security and Privacy Representatives
CM0021
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0026
|
CM0004
|
CM0010
|
CM0012
|
CM0015
|
CM0023
YES
YES
SA-11
Developer Testing and Evaluation
CM0004
|
CM0005
YES
YES
1
Developer Testing and Evaluation | Static Code Analysis
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
2
Developer Testing and Evaluation | Threat Modeling and Vulnerability Analyses
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
3
Developer Testing and Evaluation | Independent Verification of Assessment Plans and Evidence
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
NA
YES
4
Developer Testing and Evaluation | Manual Code Reviews
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
5
Developer Testing and Evaluation | Penetration Testing
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
6
Developer Testing and Evaluation | Attack Surface Reviews
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
7
Developer Testing and Evaluation | Verify Scope of Testing and Evaluation
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
NA
YES
8
Developer Testing and Evaluation | Dynamic Code Analysis
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
9
Developer Testing and Evaluation | Interactive Application Security Testing
CM0004
|
CM0016
|
CM0019
|
CM0020
|
CM0005
|
CM0008
|
CM0018
YES
YES
SA-15
Development Process, Standards, and Tools
CM0004
|
CM0017
|
CM0005
YES
YES
1
Development Process, Standards, and Tools | Quality Metrics
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
NA
2
Development Process, Standards, and Tools | Security and Privacy Tracking Tools
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
NA
3
Development Process, Standards, and Tools | Criticality Analysis
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
YES
YES
5
Development Process, Standards, and Tools | Attack Surface Reduction
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
YES
6
Development Process, Standards, and Tools | Continuous Improvement
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
NA
7
Development Process, Standards, and Tools | Automated Vulnerability Analysis
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
YES
YES
8
Development Process, Standards, and Tools | Reuse of Threat and Vulnerability Information
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
YES
YES
10
Development Process, Standards, and Tools | Incident Response Plan
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
NA
11
Development Process, Standards, and Tools | Archive System or Component
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
NA
12
Development Process, Standards, and Tools | Minimize Personally Identifiable Information
CM0022
|
CM0004
|
CM0005
|
CM0011
|
CM0016
|
CM0019
|
CM0020
NA
NA
SA-16
Developer-provided Training
None
NA
NA
SA-17
Developer Security and Privacy Architecture and Design
CM0005
YES
YES
1
Developer Security and Privacy Architecture and Design | Formal Policy Model
CM0039
NA
NA
2
Developer Security and Privacy Architecture and Design | Security-relevant Components
CM0039
NA
NA
3
Developer Security and Privacy Architecture and Design | Formal Correspondence
CM0039
NA
NA
4
Developer Security and Privacy Architecture and Design | Informal Correspondence
CM0039
NA
NA
5
Developer Security and Privacy Architecture and Design | Conceptually Simple Design
CM0039
NA
NA
6
Developer Security and Privacy Architecture and Design | Structure for Testing
CM0039
NA
NA
7
Developer Security and Privacy Architecture and Design | Structure for Least Privilege
CM0039
YES
YES
8
Developer Security and Privacy Architecture and Design | Orchestration
CM0039
NA
NA
9
Developer Security and Privacy Architecture and Design | Design Diversity
CM0039
NA
NA
SA-20
Customized Development of Critical Components
None
NA
NA
SA-21
Developer Screening
None
NA
NA
SA-22
Unsupported System Components
CM0005
NA
NA
SA-23
Specialization
None
NA
NA
SC-1
Policy and Procedures
None
NA
YES
SC-2
Separation of System and User Functionality
CM0005
NA
YES
1
Separation of System and User Functionality | Interfaces for Non-privileged Users
CM0040
|
CM0018
|
CM0039
|
CM0005
|
CM0038
NA
NA
2
Separation of System and User Functionality | Disassociability
CM0040
|
CM0018
|
CM0039
|
CM0005
|
CM0038
YES
YES
SC-3
Security Function Isolation
CM0005
|
CM0038
YES
YES
1
Security Function Isolation | Hardware Separation
None
NA
NA
2
Security Function Isolation | Access and Flow Control Functions
None
NA
NA
3
Security Function Isolation | Minimize Nonsecurity Functionality
None
NA
NA
4
Security Function Isolation | Module Coupling and Cohesiveness
None
NA
YES
5
Security Function Isolation | Layered Structures
None
NA
NA
SC-4
Information in Shared System Resources
CM0040
|
CM0005
|
CM0038
YES
YES
2
Information in Shared System Resources | Multilevel or Periods Processing
None
NA
NA
SC-5
Denial-of-service Protection
CM0005
|
CM0032
|
CM0042
|
CM0044
|
CM0029
YES
YES
1
Denial-of-service Protection | Restrict Ability to Attack Other Systems
CM0005
|
CM0032
NA
YES
2
Denial-of-service Protection | Capacity, Bandwidth, and Redundancy
CM0005
|
CM0032
NA
YES
3
Denial-of-service Protection | Detection and Monitoring
CM0005
|
CM0032
YES
YES
SC-6
Resource Availability
CM0038
YES
YES
SC-7
Boundary Protection
CM0052
|
CM0002
|
CM0033
|
CM0055
|
CM0005
|
CM0034
YES
YES
3
Boundary Protection | Access Points
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
4
Boundary Protection | External Telecommunications Services
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
5
Boundary Protection | Deny by Default — Allow by Exception
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
7
Boundary Protection | Split Tunneling for Remote Devices
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
8
Boundary Protection | Route Traffic to Authenticated Proxy Servers
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
9
Boundary Protection | Restrict Threatening Outgoing Communications Traffic
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
10
Boundary Protection | Prevent Exfiltration
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
11
Boundary Protection | Restrict Incoming Communications Traffic
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
12
Boundary Protection | Host-based Protection
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
13
Boundary Protection | Isolation of Security Tools, Mechanisms, and Support Components
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
14
Boundary Protection | Protect Against Unauthorized Physical Connections
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
YES
15
Boundary Protection | Networked Privileged Accesses
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
16
Boundary Protection | Prevent Discovery of System Components
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
17
Boundary Protection | Automated Enforcement of Protocol Formats
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
18
Boundary Protection | Fail Secure
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
19
Boundary Protection | Block Communication from Non-organizationally Configured Hosts
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
20
Boundary Protection | Dynamic Isolation and Segregation
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
21
Boundary Protection | Isolation of System Components
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
22
Boundary Protection | Separate Subnets for Connecting to Different Security Domains
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
23
Boundary Protection | Disable Sender Feedback on Protocol Validation Failure
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
24
Boundary Protection | Personally Identifiable Information
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
25
Boundary Protection | Unclassified National Security System Connections
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
26
Boundary Protection | Classified National Security System Connections
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
27
Boundary Protection | Unclassified Non-national Security System Connections
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
28
Boundary Protection | Connections to Public Networks
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
NA
NA
29
Boundary Protection | Separate Subnets to Isolate Functions
CM0005
|
CM0002
|
CM0038
|
CM0032
|
CM0031
|
CM0033
|
CM0037
|
CM0022
|
CM0040
|
CM0018
|
CM0039
YES
YES
SC-8
Transmission Confidentiality and Integrity
CM0049
|
CM0005
|
CM0006
|
CM0071
YES
YES
1
Transmission Confidentiality and Integrity | Cryptographic Protection
CM0005
|
CM0049
|
CM0029
|
CM0053
|
CM0071
YES
YES
2
Transmission Confidentiality and Integrity | Pre- and Post-transmission Handling
CM0005
|
CM0049
|
CM0029
|
CM0053
|
CM0071
NA
YES
3
Transmission Confidentiality and Integrity | Cryptographic Protection for Message Externals
CM0005
|
CM0049
|
CM0029
|
CM0053
|
CM0071
YES
YES
4
Transmission Confidentiality and Integrity | Conceal or Randomize Communications
CM0005
|
CM0049
|
CM0029
|
CM0053
|
CM0071
YES
YES
5
Transmission Confidentiality and Integrity | Protected Distribution System
CM0005
|
CM0049
|
CM0029
|
CM0053
|
CM0071
NA
NA
SC-10
Network Disconnect
CM0002
|
CM0036
|
CM0005
YES
YES
SC-11
Trusted Path
None
NA
NA
1
Trusted Path | Irrefutable Communications Path
None
NA
NA
SC-12
Cryptographic Key Establishment and Management
CM0002
|
CM0030
|
CM0005
YES
YES
1
Cryptographic Key Establishment and Management | Availability
CM0002
|
CM0030
|
CM0005
|
CM0053
YES
YES
2
Cryptographic Key Establishment and Management | Symmetric Keys
CM0002
|
CM0030
|
CM0005
|
CM0053
NA
NA
3
Cryptographic Key Establishment and Management | Asymmetric Keys
CM0002
|
CM0030
|
CM0005
|
CM0053
YES
YES
6
Cryptographic Key Establishment and Management | Physical Control of Keys
CM0002
|
CM0030
|
CM0005
|
CM0053
NA
NA
SC-13
Cryptographic Protection
CM0002
|
CM0033
|
CM0050
|
CM0005
|
CM0006
YES
YES
SC-15
Collaborative Computing Devices and Applications
CM0005
NA
NA
1
Collaborative Computing Devices and Applications | Physical or Logical Disconnect
None
NA
NA
3
Collaborative Computing Devices and Applications | Disabling and Removal in Secure Work Areas
None
NA
NA
4
Collaborative Computing Devices and Applications | Explicitly Indicate Current Participants
None
NA
NA
SC-16
Transmission of Security and Privacy Attributes
None
YES
YES
1
Transmission of Security and Privacy Attributes | Integrity Verification
CM0031
|
CM0050
|
CM0005
|
CM0032
|
CM0042
|
CM0044
|
CM0048
|
CM0002
|
CM0038
NA
YES
2
Transmission of Security and Privacy Attributes | Anti-spoofing Mechanisms
CM0031
|
CM0050
|
CM0005
|
CM0032
|
CM0042
|
CM0044
|
CM0048
|
CM0002
|
CM0038
YES
YES
3
Transmission of Security and Privacy Attributes | Cryptographic Binding
CM0031
|
CM0050
|
CM0005
|
CM0032
|
CM0042
|
CM0044
|
CM0048
|
CM0002
|
CM0038
YES
YES
SC-17
Public Key Infrastructure Certificates
None
NA
NA
SC-18
Mobile Code
None
NA
NA
1
Mobile Code | Identify Unacceptable Code and Take Corrective Actions
CM0005
NA
NA
2
Mobile Code | Acquisition, Development, and Use
CM0005
NA
NA
3
Mobile Code | Prevent Downloading and Execution
CM0005
NA
NA
4
Mobile Code | Prevent Automatic Execution
CM0005
NA
NA
5
Mobile Code | Allow Execution Only in Confined Environments
CM0005
NA
NA
SC-20
Secure Name/address Resolution Service (authoritative Source)
CM0005
NA
NA
2
Secure Name/address Resolution Service (authoritative Source) | Data Origin and Integrity
None
NA
NA
SC-21
Secure Name/address Resolution Service (recursive or Caching Resolver)
CM0005
NA
NA
SC-22
Architecture and Provisioning for Name/address Resolution Service
CM0005
NA
NA
SC-23
Session Authenticity
CM0033
|
CM0005
YES
YES
1
Session Authenticity | Invalidate Session Identifiers at Logout
CM0005
NA
YES
3
Session Authenticity | Unique System-generated Session Identifiers
CM0005
NA
YES
5
Session Authenticity | Allowed Certificate Authorities
CM0005
NA
NA
SC-24
Fail in Known State
CM0005
|
CM0006
|
CM0042
|
CM0044
YES
YES
SC-25
Thin Nodes
None
NA
NA
SC-26
Decoys
None
NA
NA
SC-27
Platform-independent Applications
None
NA
NA
SC-28
Protection of Information at Rest
CM0049
|
CM0005
NA
YES
1
Protection of Information at Rest | Cryptographic Protection
CM0002
|
CM0049
|
CM0005
|
CM0030
YES
YES
2
Protection of Information at Rest | Offline Storage
CM0002
|
CM0049
|
CM0005
|
CM0030
NA
NA
3
Protection of Information at Rest | Cryptographic Keys
CM0002
|
CM0049
|
CM0005
|
CM0030
YES
YES
SC-29
Heterogeneity
None
NA
NA
1
Heterogeneity | Virtualization Techniques
None
NA
NA
SC-30
Concealment and Misdirection
None
NA
YES
2
Concealment and Misdirection | Randomness
None
NA
NA
3
Concealment and Misdirection | Change Processing and Storage Locations
None
NA
NA
4
Concealment and Misdirection | Misleading Information
None
NA
NA
5
Concealment and Misdirection | Concealment of System Components
None
NA
YES
SC-31
Covert Channel Analysis
None
NA
NA
1
Covert Channel Analysis | Test Covert Channels for Exploitability
None
NA
NA
2
Covert Channel Analysis | Maximum Bandwidth
None
NA
NA
3
Covert Channel Analysis | Measure Bandwidth in Operational Environments
None
NA
NA
SC-32
System Partitioning
None
NA
YES
1
System Partitioning | Separate Physical Domains for Privileged Functions
CM0022
|
CM0031
|
CM0040
|
CM0039
|
CM0032
|
CM0038
YES
YES
SC-34
Non-modifiable Executable Programs
None
NA
NA
1
Non-modifiable Executable Programs | No Writable Storage
None
NA
NA
2
Non-modifiable Executable Programs | Integrity Protection on Read-only Media
None
NA
NA
SC-35
External Malicious Code Identification
None
NA
NA
SC-36
Distributed Processing and Storage
None
NA
NA
1
Distributed Processing and Storage | Polling Techniques
None
NA
NA
2
Distributed Processing and Storage | Synchronization
None
NA
NA
SC-37
Out-of-band Channels
None
NA
NA
1
Out-of-band Channels | Ensure Delivery and Transmission
None
NA
NA
SC-38
Operations Security
CM0052
|
CM0004
|
CM0005
YES
YES
SC-39
Process Isolation
CM0005
|
CM0038
YES
YES
1
Process Isolation | Hardware Separation
None
NA
NA
2
Process Isolation | Separate Execution Domain Per Thread
None
NA
NA
SC-40
Wireless Link Protection
CM0029
YES
YES
1
Wireless Link Protection | Electromagnetic Interference
CM0029
YES
YES
2
Wireless Link Protection | Reduce Detection Potential
CM0029
NA
NA
3
Wireless Link Protection | Imitative or Manipulative Communications Deception
CM0029
YES
YES
4
Wireless Link Protection | Signal Parameter Identification
CM0029
YES
YES
SC-41
Port and I/O Device Access
CM0037
NA
YES
SC-42
Sensor Capability and Data
None
NA
NA
1
Sensor Capability and Data | Reporting to Authorized Individuals or Roles
None
NA
NA
2
Sensor Capability and Data | Authorized Use
None
NA
NA
4
Sensor Capability and Data | Notice of Collection
None
NA
NA
5
Sensor Capability and Data | Collection Minimization
None
NA
NA
SC-43
Usage Restrictions
None
NA
NA
SC-44
Detonation Chambers
None
NA
NA
SC-45
System Time Synchronization
CM0005
|
CM0048
YES
YES
1
System Time Synchronization | Synchronization with Authoritative Time Source
CM0005
|
CM0048
YES
YES
2
System Time Synchronization | Secondary Authoritative Time Source
CM0005
|
CM0048
YES
YES
SC-46
Cross Domain Policy Enforcement
None
NA
NA
SC-47
Alternate Communications Paths
CM0070
NA
YES
SC-48
Sensor Relocation
None
NA
NA
1
Sensor Relocation | Dynamic Relocation of Sensors or Monitoring Capabilities
None
NA
NA
SC-49
Hardware-enforced Separation and Policy Enforcement
CM0040
|
CM0039
|
CM0005
|
CM0038
NA
NA
SC-50
Software-enforced Separation and Policy Enforcement
CM0040
|
CM0039
|
CM0005
|
CM0038
NA
NA
SC-51
Hardware-based Protection
CM0028
|
CM0005
|
CM0053
|
CM0014
YES
YES
SI-1
Policy and Procedures
None
NA
YES
SI-2
Flaw Remediation
CM0004
|
CM0010
|
CM0005
|
CM0072
YES
YES
2
Flaw Remediation | Automated Flaw Remediation Status
CM0005
|
CM0004
NA
NA
3
Flaw Remediation | Time to Remediate Flaws and Benchmarks for Corrective Actions
CM0005
|
CM0004
NA
NA
4
Flaw Remediation | Automated Patch Management Tools
CM0005
|
CM0004
NA
NA
5
Flaw Remediation | Automatic Software and Firmware Updates
CM0005
|
CM0004
NA
NA
6
Flaw Remediation | Removal of Previous Versions of Software and Firmware
CM0005
|
CM0004
YES
YES
SI-3
Malicious Code Protection
CM0027
|
CM0011
|
CM0018
|
CM0005
|
CM0032
YES
YES
4
Malicious Code Protection | Updates Only by Privileged Users
CM0002
|
CM0033
|
CM0047
|
CM0055
|
CM0034
|
CM0032
|
CM0043
|
CM0005
NA
NA
6
Malicious Code Protection | Testing and Verification
CM0002
|
CM0033
|
CM0047
|
CM0055
|
CM0034
|
CM0032
|
CM0043
|
CM0005
NA
NA
8
Malicious Code Protection | Detect Unauthorized Commands
CM0002
|
CM0033
|
CM0047
|
CM0055
|
CM0034
|
CM0032
|
CM0043
|
CM0005
YES
YES
10
Malicious Code Protection | Malicious Code Analysis
CM0002
|
CM0033
|
CM0047
|
CM0055
|
CM0034
|
CM0032
|
CM0043
|
CM0005
NA
YES
SI-4
System Monitoring
CM0052
|
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
YES
YES
1
System Monitoring | System-wide Intrusion Detection System
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
2
System Monitoring | Automated Tools and Mechanisms for Real-time Analysis
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
3
System Monitoring | Automated Tool and Mechanism Integration
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
4
System Monitoring | Inbound and Outbound Communications Traffic
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
5
System Monitoring | System-generated Alerts
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
7
System Monitoring | Automated Response to Suspicious Events
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
YES
9
System Monitoring | Testing of Monitoring Tools and Mechanisms
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
10
System Monitoring | Visibility of Encrypted Communications
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
11
System Monitoring | Analyze Communications Traffic Anomalies
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
12
System Monitoring | Automated Organization-generated Alerts
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
YES
13
System Monitoring | Analyze Traffic and Event Patterns
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
14
System Monitoring | Wireless Intrusion Detection
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
15
System Monitoring | Wireless to Wireline Communications
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
16
System Monitoring | Correlate Monitoring Information
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
17
System Monitoring | Integrated Situational Awareness
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
18
System Monitoring | Analyze Traffic and Covert Exfiltration
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
19
System Monitoring | Risk for Individuals
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
20
System Monitoring | Privileged Users
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
21
System Monitoring | Probationary Periods
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
22
System Monitoring | Unauthorized Network Services
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
23
System Monitoring | Host-based Devices
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
NA
NA
24
System Monitoring | Indicators of Compromise
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
25
System Monitoring | Optimize Network Traffic Analysis
CM0005
|
CM0032
|
CM0066
|
CM0067
|
CM0068
|
CM0050
|
CM0073
|
CM0051
YES
YES
SI-5
Security Alerts, Advisories, and Directives
CM0005
NA
NA
1
Security Alerts, Advisories, and Directives | Automated Alerts and Advisories
CM0005
NA
NA
SI-6
Security and Privacy Function Verification
CM0005
|
CM0032
YES
YES
2
Security and Privacy Function Verification | Automation Support for Distributed Testing
None
NA
NA
3
Security and Privacy Function Verification | Report Verification Results
None
NA
NA
SI-7
Software, Firmware, and Information Integrity
CM0049
|
CM0021
|
CM0005
YES
YES
1
Software, Firmware, and Information Integrity | Integrity Checks
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
YES
2
Software, Firmware, and Information Integrity | Automated Notifications of Integrity Violations
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
YES
3
Software, Firmware, and Information Integrity | Centrally Managed Integrity Tools
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
NA
5
Software, Firmware, and Information Integrity | Automated Response to Integrity Violations
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
YES
6
Software, Firmware, and Information Integrity | Cryptographic Protection
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
YES
7
Software, Firmware, and Information Integrity | Integration of Detection and Response
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
YES
8
Software, Firmware, and Information Integrity | Auditing Capability for Significant Events
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
YES
YES
9
Software, Firmware, and Information Integrity | Verify Boot Process
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
YES
YES
10
Software, Firmware, and Information Integrity | Protection of Boot Firmware
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
YES
12
Software, Firmware, and Information Integrity | Integrity Verification
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
YES
YES
15
Software, Firmware, and Information Integrity | Code Authentication
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
YES
YES
16
Software, Firmware, and Information Integrity | Time Limit on Process Execution Without Supervision
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
NA
NA
17
Software, Firmware, and Information Integrity | Runtime Application Self-protection
CM0049
|
CM0005
|
CM0032
|
CM0014
|
CM0021
|
CM0044
YES
YES
SI-8
Spam Protection
None
NA
NA
2
Spam Protection | Automatic Updates
None
NA
NA
3
Spam Protection | Continuous Learning Capability
None
NA
NA
SI-10
Information Input Validation
CM0002
|
CM0033
|
CM0005
|
CM0043
YES
YES
1
Information Input Validation | Manual Override Capability
CM0002
|
CM0005
|
CM0043
|
CM0033
|
CM0069
|
CM0032
NA
NA
2
Information Input Validation | Review and Resolve Errors
CM0002
|
CM0005
|
CM0043
|
CM0033
|
CM0069
|
CM0032
NA
NA
3
Information Input Validation | Predictable Behavior
CM0002
|
CM0005
|
CM0043
|
CM0033
|
CM0069
|
CM0032
YES
YES
4
Information Input Validation | Timing Interactions
CM0002
|
CM0005
|
CM0043
|
CM0033
|
CM0069
|
CM0032
NA
NA
5
Information Input Validation | Restrict Inputs to Trusted Sources and Approved Formats
CM0002
|
CM0005
|
CM0043
|
CM0033
|
CM0069
|
CM0032
YES
YES
6
Information Input Validation | Injection Prevention
CM0002
|
CM0005
|
CM0043
|
CM0033
|
CM0069
|
CM0032
YES
YES
SI-11
Error Handling
CM0005
|
CM0044
YES
YES
SI-12
Information Management and Retention
None
NA
YES
1
Information Management and Retention | Limit Personally Identifiable Information Elements
None
NA
NA
2
Information Management and Retention | Minimize Personally Identifiable Information in Testing, Training, and Research
None
NA
NA
3
Information Management and Retention | Information Disposal
None
NA
NA
SI-13
Predictable Failure Prevention
CM0042
|
CM0051
YES
YES
1
Predictable Failure Prevention | Transferring Component Responsibilities
None
NA
NA
3
Predictable Failure Prevention | Manual Transfer Between Components
None
NA
NA
4
Predictable Failure Prevention | Standby Component Installation and Notification
None
NA
YES
5
Predictable Failure Prevention | Failover Capability
None
NA
NA
SI-14
Non-persistence
None
NA
YES
1
Non-persistence | Refresh from Trusted Sources
CM0031
|
CM0036
|
CM0005
NA
YES
2
Non-persistence | Non-persistent Information
CM0031
|
CM0036
|
CM0005
NA
NA
3
Non-persistence | Non-persistent Connectivity
CM0031
|
CM0036
|
CM0005
YES
YES
SI-15
Information Output Filtering
None
NA
NA
SI-16
Memory Protection
CM0005
|
CM0032
|
CM0045
YES
YES
SI-17
Fail-safe Procedures
CM0032
|
CM0042
|
CM0044
|
CM0038
YES
YES
SI-18
Personally Identifiable Information Quality Operations
None
NA
NA
1
Personally Identifiable Information Quality Operations | Automation Support
None
NA
NA
2
Personally Identifiable Information Quality Operations | Data Tags
None
NA
NA
3
Personally Identifiable Information Quality Operations | Collection
None
NA
NA
4
Personally Identifiable Information Quality Operations | Individual Requests
None
NA
NA
5
Personally Identifiable Information Quality Operations | Notice of Correction or Deletion
None
NA
NA
SI-19
De-identification
None
NA
NA
1
De-identification | Collection
CM0002
|
CM0050
|
CM0005
NA
NA
2
De-identification | Archiving
CM0002
|
CM0050
|
CM0005
NA
NA
3
De-identification | Release
CM0002
|
CM0050
|
CM0005
NA
NA
4
De-identification | Removal, Masking, Encryption, Hashing, or Replacement of Direct Identifiers
CM0002
|
CM0050
|
CM0005
NA
NA
5
De-identification | Statistical Disclosure Control
CM0002
|
CM0050
|
CM0005
NA
NA
6
De-identification | Differential Privacy
CM0002
|
CM0050
|
CM0005
NA
NA
7
De-identification | Validated Algorithms and Software
CM0002
|
CM0050
|
CM0005
NA
NA
8
De-identification | Motivated Intruder
CM0002
|
CM0050
|
CM0005
NA
NA
SI-20
Tainting
None
NA
NA
SI-21
Information Refresh
CM0001
|
CM0005
NA
YES
SI-22
Information Diversity
None
NA
NA
SI-23
Information Fragmentation
CM0001
NA
NA
SR-1
Policy and Procedures
CM0022
|
CM0024
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
SR-2
Supply Chain Risk Management Plan
CM0022
|
CM0024
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
1
Supply Chain Risk Management Plan | Establish Scrm Team
CM0022
|
CM0024
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
SR-3
Supply Chain Controls and Processes
CM0022
|
CM0024
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
1
Supply Chain Controls and Processes | Diverse Supply Base
CM0025
|
CM0026
|
CM0005
|
CM0022
|
CM0004
YES
YES
2
Supply Chain Controls and Processes | Limitation of Harm
CM0025
|
CM0026
|
CM0005
|
CM0022
|
CM0004
YES
YES
3
Supply Chain Controls and Processes | Sub-tier Flow Down
CM0025
|
CM0026
|
CM0005
|
CM0022
|
CM0004
YES
YES
SR-4
Provenance
CM0024
|
CM0025
|
CM0026
|
CM0004
|
CM0005
YES
YES
1
Provenance | Identity
CM0024
|
CM0025
|
CM0026
|
CM0004
|
CM0005
|
CM0028
YES
YES
2
Provenance | Track and Trace
CM0024
|
CM0025
|
CM0026
|
CM0004
|
CM0005
|
CM0028
YES
YES
3
Provenance | Validate as Genuine and Not Altered
CM0024
|
CM0025
|
CM0026
|
CM0004
|
CM0005
|
CM0028
YES
YES
4
Provenance | Supply Chain Integrity — Pedigree
CM0024
|
CM0025
|
CM0026
|
CM0004
|
CM0005
|
CM0028
YES
YES
SR-5
Acquisition Strategies, Tools, and Methods
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
1
Acquisition Strategies, Tools, and Methods | Adequate Supply
CM0022
|
CM0025
|
CM0026
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0004
YES
YES
2
Acquisition Strategies, Tools, and Methods | Assessments Prior to Selection, Acceptance, Modification, or Update
CM0022
|
CM0025
|
CM0026
|
CM0005
|
CM0024
|
CM0027
|
CM0028
|
CM0004
YES
YES
SR-6
Supplier Assessments and Reviews
CM0025
|
CM0004
|
CM0005
YES
YES
1
Supplier Assessments and Reviews | Testing and Analysis
CM0024
|
CM0027
|
CM0028
|
CM0004
|
CM0018
|
CM0005
YES
YES
SR-7
Supply Chain Operations Security
CM0001
|
CM0022
|
CM0004
|
CM0005
YES
YES
SR-8
Notification Agreements
CM0009
|
CM0005
NA
NA
SR-9
Tamper Resistance and Detection
CM0024
|
CM0028
|
CM0005
YES
YES
1
Tamper Resistance and Detection | Multiple Stages of System Development Life Cycle
CM0024
|
CM0028
|
CM0005
YES
YES
SR-10
Inspection of Systems or Components
CM0024
|
CM0028
|
CM0005
YES
YES
SR-11
Component Authenticity
CM0024
|
CM0025
|
CM0026
|
CM0027
|
CM0028
|
CM0004
|
CM0005
YES
YES
1
Component Authenticity | Anti-counterfeit Training
CM0041
|
CM0005
|
CM0052
|
CM0023
|
CM0053
|
CM0024
|
CM0028
NA
NA
2
Component Authenticity | Configuration Control for Component Service and Repair
CM0041
|
CM0005
|
CM0052
|
CM0023
|
CM0053
|
CM0024
|
CM0028
NA
NA
3
Component Authenticity | Anti-counterfeit Scanning
CM0041
|
CM0005
|
CM0052
|
CM0023
|
CM0053
|
CM0024
|
CM0028
YES
YES
SR-12
Component Disposal
CM0001
|
CM0005
NA
YES