bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,450 @@
|
|
|
1
|
+
# NIST SP 800-53 Rev 5 — Control Families Reference
|
|
2
|
+
|
|
3
|
+
## How to Use This Reference
|
|
4
|
+
|
|
5
|
+
For each family: key controls with baseline assignment, critical enhancements, and implementation guidance. Baseline codes: **L** = Low, **M** = Moderate, **H** = High. Controls marked **(org)** are PM family — organization-wide, not baseline-specific.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## AC — Access Control (25 controls)
|
|
10
|
+
|
|
11
|
+
**Purpose:** Limit system access to authorized users, processes, devices, and types of transactions.
|
|
12
|
+
|
|
13
|
+
| Control | L | M | H | Description |
|
|
14
|
+
|---------|---|---|---|-------------|
|
|
15
|
+
| AC-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
16
|
+
| AC-2 | ✓ | ✓ | ✓ | Account Management — create, enable, modify, disable, remove accounts |
|
|
17
|
+
| AC-2(1) | — | ✓ | ✓ | Automated System Account Management |
|
|
18
|
+
| AC-2(3) | — | ✓ | ✓ | Disable Accounts (after inactivity — ODV: 90 days typical) |
|
|
19
|
+
| AC-2(5) | — | ✓ | ✓ | Inactivity Logout |
|
|
20
|
+
| AC-2(12) | — | — | ✓ | Account Monitoring for Atypical Usage |
|
|
21
|
+
| AC-3 | ✓ | ✓ | ✓ | Access Enforcement — enforce approved authorizations |
|
|
22
|
+
| AC-4 | — | ✓ | ✓ | Information Flow Enforcement |
|
|
23
|
+
| AC-5 | — | ✓ | ✓ | Separation of Duties |
|
|
24
|
+
| AC-6 | — | ✓ | ✓ | Least Privilege |
|
|
25
|
+
| AC-6(1) | — | ✓ | ✓ | Authorize Access to Security Functions |
|
|
26
|
+
| AC-6(2) | — | ✓ | ✓ | Non-Privileged Access for Non-Security Functions |
|
|
27
|
+
| AC-6(5) | — | ✓ | ✓ | Privileged Accounts |
|
|
28
|
+
| AC-6(9) | — | ✓ | ✓ | Log Use of Privileged Functions |
|
|
29
|
+
| AC-6(10) | — | ✓ | ✓ | Prohibit Non-Privileged Users from Executing Privileged Functions |
|
|
30
|
+
| AC-7 | ✓ | ✓ | ✓ | Unsuccessful Logon Attempts (lockout after ODV attempts) |
|
|
31
|
+
| AC-8 | ✓ | ✓ | ✓ | System Use Notification (login banner) |
|
|
32
|
+
| AC-11 | — | ✓ | ✓ | Device Lock |
|
|
33
|
+
| AC-12 | — | ✓ | ✓ | Session Termination |
|
|
34
|
+
| AC-14 | ✓ | ✓ | ✓ | Permitted Actions Without Identification or Authentication |
|
|
35
|
+
| AC-17 | ✓ | ✓ | ✓ | Remote Access |
|
|
36
|
+
| AC-17(1) | — | ✓ | ✓ | Monitoring and Control of Remote Access |
|
|
37
|
+
| AC-18 | ✓ | ✓ | ✓ | Wireless Access |
|
|
38
|
+
| AC-19 | ✓ | ✓ | ✓ | Access Control for Mobile Devices |
|
|
39
|
+
| AC-20 | ✓ | ✓ | ✓ | Use of External Systems |
|
|
40
|
+
| AC-22 | ✓ | ✓ | ✓ | Publicly Accessible Content |
|
|
41
|
+
|
|
42
|
+
**Implementation notes:**
|
|
43
|
+
- AC-2 requires documented procedures for account lifecycle; automated provisioning/deprovisioning satisfies AC-2(1)
|
|
44
|
+
- AC-6 least privilege: document roles, restrict admin rights to dedicated admin accounts
|
|
45
|
+
- AC-17 remote access: requires MFA (IA-2), encryption in transit (SC-8), and monitoring
|
|
46
|
+
|
|
47
|
+
---
|
|
48
|
+
|
|
49
|
+
## AT — Awareness and Training (6 controls)
|
|
50
|
+
|
|
51
|
+
| Control | L | M | H | Description |
|
|
52
|
+
|---------|---|---|---|-------------|
|
|
53
|
+
| AT-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
54
|
+
| AT-2 | ✓ | ✓ | ✓ | Literacy Training and Awareness (annual; new hire; role change) |
|
|
55
|
+
| AT-2(2) | — | ✓ | ✓ | Insider Threat Awareness |
|
|
56
|
+
| AT-3 | ✓ | ✓ | ✓ | Role-Based Training (before access; when changes occur) |
|
|
57
|
+
| AT-4 | ✓ | ✓ | ✓ | Training Records (retain for ODV period, typically 3 years) |
|
|
58
|
+
| AT-6 | — | — | ✓ | Training Feedback |
|
|
59
|
+
|
|
60
|
+
---
|
|
61
|
+
|
|
62
|
+
## AU — Audit and Accountability (16 controls)
|
|
63
|
+
|
|
64
|
+
**Purpose:** Create and protect system audit records; ensure accountability of user actions.
|
|
65
|
+
|
|
66
|
+
| Control | L | M | H | Description |
|
|
67
|
+
|---------|---|---|---|-------------|
|
|
68
|
+
| AU-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
69
|
+
| AU-2 | ✓ | ✓ | ✓ | Event Logging — define auditable events |
|
|
70
|
+
| AU-3 | ✓ | ✓ | ✓ | Content of Audit Records (what, when, where, source, outcome) |
|
|
71
|
+
| AU-3(1) | — | ✓ | ✓ | Additional Audit Information |
|
|
72
|
+
| AU-4 | ✓ | ✓ | ✓ | Audit Log Storage Capacity |
|
|
73
|
+
| AU-5 | ✓ | ✓ | ✓ | Response to Audit Logging Process Failures |
|
|
74
|
+
| AU-6 | ✓ | ✓ | ✓ | Audit Record Review, Analysis, and Reporting |
|
|
75
|
+
| AU-6(1) | — | ✓ | ✓ | Automated Process Integration (SIEM) |
|
|
76
|
+
| AU-7 | — | ✓ | ✓ | Audit Record Reduction and Report Generation |
|
|
77
|
+
| AU-8 | ✓ | ✓ | ✓ | Time Stamps (synchronized; NTP) |
|
|
78
|
+
| AU-9 | ✓ | ✓ | ✓ | Protection of Audit Information |
|
|
79
|
+
| AU-9(4) | — | ✓ | ✓ | Access by Subset of Privileged Users |
|
|
80
|
+
| AU-10 | — | — | ✓ | Non-Repudiation |
|
|
81
|
+
| AU-11 | ✓ | ✓ | ✓ | Audit Record Retention (ODV: typically 3 years for federal) |
|
|
82
|
+
| AU-12 | ✓ | ✓ | ✓ | Audit Record Generation |
|
|
83
|
+
| AU-14 | — | — | ✓ | Session Audit |
|
|
84
|
+
|
|
85
|
+
**Key events to audit (AU-2):** logon/logoff attempts, privilege escalation, account creation/modification/deletion, system configuration changes, access to sensitive data, use of admin functions.
|
|
86
|
+
|
|
87
|
+
---
|
|
88
|
+
|
|
89
|
+
## CA — Assessment, Authorization, and Monitoring (9 controls)
|
|
90
|
+
|
|
91
|
+
| Control | L | M | H | Description |
|
|
92
|
+
|---------|---|---|---|-------------|
|
|
93
|
+
| CA-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
94
|
+
| CA-2 | ✓ | ✓ | ✓ | Control Assessments (annual or event-driven) |
|
|
95
|
+
| CA-2(1) | — | ✓ | ✓ | Independent Assessors (3PAO for FedRAMP) |
|
|
96
|
+
| CA-3 | ✓ | ✓ | ✓ | Information Exchange (ISA/MOU for interconnections) |
|
|
97
|
+
| CA-5 | ✓ | ✓ | ✓ | Plan of Action and Milestones (POA&M) |
|
|
98
|
+
| CA-6 | ✓ | ✓ | ✓ | Authorization (ATO from Authorizing Official) |
|
|
99
|
+
| CA-7 | ✓ | ✓ | ✓ | Continuous Monitoring (ConMon strategy; ODV frequencies) |
|
|
100
|
+
| CA-7(1) | — | ✓ | ✓ | Independent Assessment |
|
|
101
|
+
| CA-8 | — | — | ✓ | Penetration Testing |
|
|
102
|
+
| CA-9 | ✓ | ✓ | ✓ | Internal System Connections |
|
|
103
|
+
|
|
104
|
+
---
|
|
105
|
+
|
|
106
|
+
## CM — Configuration Management (14 controls)
|
|
107
|
+
|
|
108
|
+
| Control | L | M | H | Description |
|
|
109
|
+
|---------|---|---|---|-------------|
|
|
110
|
+
| CM-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
111
|
+
| CM-2 | ✓ | ✓ | ✓ | Baseline Configuration |
|
|
112
|
+
| CM-2(2) | — | ✓ | ✓ | Automation Support for Accuracy and Currency |
|
|
113
|
+
| CM-3 | — | ✓ | ✓ | Configuration Change Control |
|
|
114
|
+
| CM-4 | ✓ | ✓ | ✓ | Impact Analyses |
|
|
115
|
+
| CM-5 | — | ✓ | ✓ | Access Restrictions for Change |
|
|
116
|
+
| CM-6 | ✓ | ✓ | ✓ | Configuration Settings (SCAP/STIG/CIS Benchmarks) |
|
|
117
|
+
| CM-6(1) | — | ✓ | ✓ | Automated Management, Application, and Verification |
|
|
118
|
+
| CM-7 | ✓ | ✓ | ✓ | Least Functionality (disable unnecessary functions/ports/services) |
|
|
119
|
+
| CM-7(1) | — | ✓ | ✓ | Periodic Review |
|
|
120
|
+
| CM-7(2) | — | ✓ | ✓ | Prevent Software Execution |
|
|
121
|
+
| CM-7(5) | — | ✓ | ✓ | Authorized Software / Allowlisting |
|
|
122
|
+
| CM-8 | ✓ | ✓ | ✓ | System Component Inventory |
|
|
123
|
+
| CM-9 | — | ✓ | ✓ | Configuration Management Plan |
|
|
124
|
+
| CM-10 | ✓ | ✓ | ✓ | Software Usage Restrictions |
|
|
125
|
+
| CM-11 | ✓ | ✓ | ✓ | User-Installed Software |
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## CP — Contingency Planning (13 controls)
|
|
130
|
+
|
|
131
|
+
| Control | L | M | H | Description |
|
|
132
|
+
|---------|---|---|---|-------------|
|
|
133
|
+
| CP-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
134
|
+
| CP-2 | ✓ | ✓ | ✓ | Contingency Plan (BCP/DRP) |
|
|
135
|
+
| CP-2(3) | — | ✓ | ✓ | Resume All Missions and Business Functions |
|
|
136
|
+
| CP-3 | ✓ | ✓ | ✓ | Contingency Training |
|
|
137
|
+
| CP-4 | ✓ | ✓ | ✓ | Contingency Plan Testing |
|
|
138
|
+
| CP-4(1) | — | ✓ | ✓ | Coordinate with Related Plans |
|
|
139
|
+
| CP-6 | — | ✓ | ✓ | Alternate Storage Site |
|
|
140
|
+
| CP-7 | — | ✓ | ✓ | Alternate Processing Site |
|
|
141
|
+
| CP-8 | — | ✓ | ✓ | Telecommunications Services |
|
|
142
|
+
| CP-9 | ✓ | ✓ | ✓ | System Backup |
|
|
143
|
+
| CP-9(1) | — | ✓ | ✓ | Testing for Reliability and Integrity |
|
|
144
|
+
| CP-10 | ✓ | ✓ | ✓ | System Recovery and Reconstitution |
|
|
145
|
+
| CP-10(2) | — | ✓ | ✓ | Transaction Recovery |
|
|
146
|
+
|
|
147
|
+
**RTO/RPO guidance:** CP-2 should document target RTO and RPO; CP-7 alternate site must support target RTO.
|
|
148
|
+
|
|
149
|
+
---
|
|
150
|
+
|
|
151
|
+
## IA — Identification and Authentication (13 controls)
|
|
152
|
+
|
|
153
|
+
**Purpose:** Identify and authenticate users, devices, and processes.
|
|
154
|
+
|
|
155
|
+
| Control | L | M | H | Description |
|
|
156
|
+
|---------|---|---|---|-------------|
|
|
157
|
+
| IA-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
158
|
+
| IA-2 | ✓ | ✓ | ✓ | Identification and Authentication (Organizational Users) |
|
|
159
|
+
| IA-2(1) | ✓ | ✓ | ✓ | MFA for Privileged Accounts |
|
|
160
|
+
| IA-2(2) | ✓ | ✓ | ✓ | MFA for Non-Privileged Accounts (network access) |
|
|
161
|
+
| IA-2(6) | — | — | ✓ | MFA for Separate Device |
|
|
162
|
+
| IA-2(8) | — | ✓ | ✓ | Access to Accounts — Replay Resistant |
|
|
163
|
+
| IA-2(12) | ✓ | ✓ | ✓ | Acceptance of PIV Credentials |
|
|
164
|
+
| IA-3 | — | ✓ | ✓ | Device Identification and Authentication |
|
|
165
|
+
| IA-4 | ✓ | ✓ | ✓ | Identifier Management |
|
|
166
|
+
| IA-5 | ✓ | ✓ | ✓ | Authenticator Management |
|
|
167
|
+
| IA-5(1) | ✓ | ✓ | ✓ | Password-Based Authentication |
|
|
168
|
+
| IA-5(2) | — | ✓ | ✓ | PKI-Based Authentication |
|
|
169
|
+
| IA-6 | ✓ | ✓ | ✓ | Authentication Feedback (obscure passwords) |
|
|
170
|
+
| IA-7 | ✓ | ✓ | ✓ | Cryptographic Module Authentication |
|
|
171
|
+
| IA-8 | ✓ | ✓ | ✓ | Identification and Authentication (Non-Organizational Users) |
|
|
172
|
+
| IA-11 | — | ✓ | ✓ | Re-authentication |
|
|
173
|
+
| IA-12 | — | ✓ | ✓ | Identity Proofing (NIST SP 800-63A levels) |
|
|
174
|
+
|
|
175
|
+
**MFA requirements (post-EO 14028):** Federal systems must use phishing-resistant MFA (PIV/CAC, FIDO2) — IA-2(1) and IA-2(2) are now required at Low baseline for federal systems.
|
|
176
|
+
|
|
177
|
+
---
|
|
178
|
+
|
|
179
|
+
## IR — Incident Response (10 controls)
|
|
180
|
+
|
|
181
|
+
| Control | L | M | H | Description |
|
|
182
|
+
|---------|---|---|---|-------------|
|
|
183
|
+
| IR-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
184
|
+
| IR-2 | ✓ | ✓ | ✓ | Incident Response Training |
|
|
185
|
+
| IR-3 | — | ✓ | ✓ | Incident Response Testing |
|
|
186
|
+
| IR-4 | ✓ | ✓ | ✓ | Incident Handling |
|
|
187
|
+
| IR-4(1) | — | ✓ | ✓ | Automated Incident Handling Processes |
|
|
188
|
+
| IR-5 | ✓ | ✓ | ✓ | Incident Monitoring |
|
|
189
|
+
| IR-6 | ✓ | ✓ | ✓ | Incident Reporting (US-CERT/CISA — 1-hour for major incidents) |
|
|
190
|
+
| IR-6(1) | — | ✓ | ✓ | Automated Reporting |
|
|
191
|
+
| IR-7 | ✓ | ✓ | ✓ | Incident Response Assistance |
|
|
192
|
+
| IR-8 | ✓ | ✓ | ✓ | Incident Response Plan |
|
|
193
|
+
| IR-10 | — | — | ✓ | Integrated Information Security Analysis Team |
|
|
194
|
+
|
|
195
|
+
**Federal reporting (IR-6):** Report cybersecurity incidents to CISA within 1 hour for major incidents; FISMA annual reporting to OMB.
|
|
196
|
+
|
|
197
|
+
---
|
|
198
|
+
|
|
199
|
+
## MA — Maintenance (6 controls)
|
|
200
|
+
|
|
201
|
+
| Control | L | M | H | Description |
|
|
202
|
+
|---------|---|---|---|-------------|
|
|
203
|
+
| MA-2 | ✓ | ✓ | ✓ | Controlled Maintenance |
|
|
204
|
+
| MA-3 | — | ✓ | ✓ | Maintenance Tools |
|
|
205
|
+
| MA-4 | ✓ | ✓ | ✓ | Nonlocal Maintenance |
|
|
206
|
+
| MA-5 | ✓ | ✓ | ✓ | Maintenance Personnel |
|
|
207
|
+
| MA-6 | — | ✓ | ✓ | Timely Maintenance |
|
|
208
|
+
|
|
209
|
+
---
|
|
210
|
+
|
|
211
|
+
## MP — Media Protection (8 controls)
|
|
212
|
+
|
|
213
|
+
| Control | L | M | H | Description |
|
|
214
|
+
|---------|---|---|---|-------------|
|
|
215
|
+
| MP-2 | ✓ | ✓ | ✓ | Media Access |
|
|
216
|
+
| MP-3 | — | ✓ | ✓ | Media Marking |
|
|
217
|
+
| MP-4 | — | ✓ | ✓ | Media Storage |
|
|
218
|
+
| MP-5 | — | ✓ | ✓ | Media Transport |
|
|
219
|
+
| MP-6 | ✓ | ✓ | ✓ | Media Sanitization (NIST SP 800-88 guidelines) |
|
|
220
|
+
| MP-7 | ✓ | ✓ | ✓ | Media Use |
|
|
221
|
+
|
|
222
|
+
---
|
|
223
|
+
|
|
224
|
+
## PE — Physical and Environmental Protection (23 controls)
|
|
225
|
+
|
|
226
|
+
| Control | L | M | H | Description |
|
|
227
|
+
|---------|---|---|---|-------------|
|
|
228
|
+
| PE-2 | ✓ | ✓ | ✓ | Physical Access Authorizations |
|
|
229
|
+
| PE-3 | ✓ | ✓ | ✓ | Physical Access Control |
|
|
230
|
+
| PE-6 | ✓ | ✓ | ✓ | Monitoring Physical Access |
|
|
231
|
+
| PE-8 | ✓ | ✓ | ✓ | Visitor Access Records |
|
|
232
|
+
| PE-12 | ✓ | ✓ | ✓ | Emergency Lighting |
|
|
233
|
+
| PE-13 | ✓ | ✓ | ✓ | Fire Protection |
|
|
234
|
+
| PE-14 | ✓ | ✓ | ✓ | Environmental Controls (temperature, humidity) |
|
|
235
|
+
| PE-15 | ✓ | ✓ | ✓ | Water Damage Protection |
|
|
236
|
+
| PE-16 | ✓ | ✓ | ✓ | Delivery and Removal |
|
|
237
|
+
| PE-17 | — | ✓ | ✓ | Alternate Work Site |
|
|
238
|
+
| PE-19 | — | ✓ | ✓ | Information Leakage |
|
|
239
|
+
|
|
240
|
+
---
|
|
241
|
+
|
|
242
|
+
## PL — Planning (11 controls)
|
|
243
|
+
|
|
244
|
+
| Control | L | M | H | Description |
|
|
245
|
+
|---------|---|---|---|-------------|
|
|
246
|
+
| PL-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
247
|
+
| PL-2 | ✓ | ✓ | ✓ | System Security and Privacy Plan (SSP) |
|
|
248
|
+
| PL-4 | ✓ | ✓ | ✓ | Rules of Behavior |
|
|
249
|
+
| PL-8 | — | ✓ | ✓ | Security and Privacy Architectures |
|
|
250
|
+
| PL-10 | — | ✓ | ✓ | Baseline Selection |
|
|
251
|
+
| PL-11 | — | ✓ | ✓ | Baseline Tailoring |
|
|
252
|
+
|
|
253
|
+
---
|
|
254
|
+
|
|
255
|
+
## PS — Personnel Security (9 controls)
|
|
256
|
+
|
|
257
|
+
| Control | L | M | H | Description |
|
|
258
|
+
|---------|---|---|---|-------------|
|
|
259
|
+
| PS-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
260
|
+
| PS-2 | ✓ | ✓ | ✓ | Position Risk Designation |
|
|
261
|
+
| PS-3 | ✓ | ✓ | ✓ | Personnel Screening |
|
|
262
|
+
| PS-4 | ✓ | ✓ | ✓ | Personnel Termination |
|
|
263
|
+
| PS-5 | ✓ | ✓ | ✓ | Personnel Transfer |
|
|
264
|
+
| PS-6 | ✓ | ✓ | ✓ | Access Agreements |
|
|
265
|
+
| PS-7 | ✓ | ✓ | ✓ | External Personnel Security |
|
|
266
|
+
| PS-8 | ✓ | ✓ | ✓ | Personnel Sanctions |
|
|
267
|
+
| PS-9 | — | ✓ | ✓ | Position Descriptions |
|
|
268
|
+
|
|
269
|
+
---
|
|
270
|
+
|
|
271
|
+
## PT — PII Processing and Transparency (8 controls)
|
|
272
|
+
|
|
273
|
+
**Purpose:** Govern how organizations handle Personally Identifiable Information (PII). New in Rev 5; applies to systems processing PII.
|
|
274
|
+
|
|
275
|
+
| Control | Description |
|
|
276
|
+
|---------|-------------|
|
|
277
|
+
| PT-1 | Policy and Procedures |
|
|
278
|
+
| PT-2 | Authority to Process PII (legal basis) |
|
|
279
|
+
| PT-3 | Purposing Specification (why PII is collected) |
|
|
280
|
+
| PT-4 | Consent (where legally required) |
|
|
281
|
+
| PT-5 | Privacy Notice (transparency at collection) |
|
|
282
|
+
| PT-6 | System of Records Notice (SORN for Privacy Act systems) |
|
|
283
|
+
| PT-7 | Specific Categories of Personally Identifiable Information |
|
|
284
|
+
| PT-8 | Computer Matching Requirements |
|
|
285
|
+
|
|
286
|
+
**Privacy Act connection:** PT-6 requires a SORN for systems covered by the Privacy Act (5 U.S.C. § 552a). Published in the Federal Register.
|
|
287
|
+
|
|
288
|
+
---
|
|
289
|
+
|
|
290
|
+
## RA — Risk Assessment (10 controls)
|
|
291
|
+
|
|
292
|
+
| Control | L | M | H | Description |
|
|
293
|
+
|---------|---|---|---|-------------|
|
|
294
|
+
| RA-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
295
|
+
| RA-2 | ✓ | ✓ | ✓ | Security Categorization (FIPS 199) |
|
|
296
|
+
| RA-3 | ✓ | ✓ | ✓ | Risk Assessment (SP 800-30 methodology) |
|
|
297
|
+
| RA-3(1) | — | ✓ | ✓ | Supply Chain Risk Assessment |
|
|
298
|
+
| RA-5 | ✓ | ✓ | ✓ | Vulnerability Monitoring and Scanning |
|
|
299
|
+
| RA-5(2) | — | ✓ | ✓ | Update Vulnerabilities to be Scanned |
|
|
300
|
+
| RA-5(5) | — | ✓ | ✓ | Privileged Access |
|
|
301
|
+
| RA-7 | ✓ | ✓ | ✓ | Risk Response |
|
|
302
|
+
| RA-9 | — | ✓ | ✓ | Criticality Analysis |
|
|
303
|
+
| RA-10 | — | — | ✓ | Threat Hunting |
|
|
304
|
+
|
|
305
|
+
**Vulnerability scanning cadence (RA-5):** CISA BOD 19-02 — Critical vulnerabilities patch within 15 days, High within 30 days. FedRAMP: monthly OS/web app scans; weekly database scans.
|
|
306
|
+
|
|
307
|
+
---
|
|
308
|
+
|
|
309
|
+
## SA — System and Services Acquisition (23 controls)
|
|
310
|
+
|
|
311
|
+
| Control | L | M | H | Description |
|
|
312
|
+
|---------|---|---|---|-------------|
|
|
313
|
+
| SA-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
314
|
+
| SA-2 | ✓ | ✓ | ✓ | Allocation of Resources |
|
|
315
|
+
| SA-3 | ✓ | ✓ | ✓ | System Development Life Cycle (SDLC security integration) |
|
|
316
|
+
| SA-4 | ✓ | ✓ | ✓ | Acquisition Process (security requirements in contracts) |
|
|
317
|
+
| SA-4(1) | — | ✓ | ✓ | Functional Properties of Controls |
|
|
318
|
+
| SA-4(2) | — | ✓ | ✓ | Design and Implementation Information |
|
|
319
|
+
| SA-4(9) | — | ✓ | ✓ | Functions, Ports, Protocols, and Services in Use |
|
|
320
|
+
| SA-5 | ✓ | ✓ | ✓ | System Documentation |
|
|
321
|
+
| SA-8 | — | ✓ | ✓ | Security and Privacy Engineering Principles |
|
|
322
|
+
| SA-9 | ✓ | ✓ | ✓ | External System Services |
|
|
323
|
+
| SA-10 | — | ✓ | ✓ | Developer Configuration Management |
|
|
324
|
+
| SA-11 | — | ✓ | ✓ | Developer Testing and Evaluation |
|
|
325
|
+
| SA-15 | — | ✓ | ✓ | Development Process, Standards, and Tools |
|
|
326
|
+
| SA-17 | — | — | ✓ | Developer Architecture and Design |
|
|
327
|
+
| SA-22 | ✓ | ✓ | ✓ | Unsupported System Components |
|
|
328
|
+
|
|
329
|
+
---
|
|
330
|
+
|
|
331
|
+
## SC — System and Communications Protection (51 controls)
|
|
332
|
+
|
|
333
|
+
**Purpose:** Protect communications and system boundaries.
|
|
334
|
+
|
|
335
|
+
| Control | L | M | H | Description |
|
|
336
|
+
|---------|---|---|---|-------------|
|
|
337
|
+
| SC-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
338
|
+
| SC-5 | ✓ | ✓ | ✓ | Denial of Service Protection |
|
|
339
|
+
| SC-7 | ✓ | ✓ | ✓ | Boundary Protection (firewalls, DMZ, NGFW) |
|
|
340
|
+
| SC-7(3) | — | ✓ | ✓ | Access Points |
|
|
341
|
+
| SC-7(4) | — | ✓ | ✓ | External Telecommunications Services |
|
|
342
|
+
| SC-7(5) | — | ✓ | ✓ | Deny by Default / Allow by Exception |
|
|
343
|
+
| SC-7(7) | — | ✓ | ✓ | Split Tunneling for Remote Devices |
|
|
344
|
+
| SC-7(8) | — | ✓ | ✓ | Route Traffic to Authenticated Proxy Servers |
|
|
345
|
+
| SC-8 | — | ✓ | ✓ | Transmission Confidentiality and Integrity |
|
|
346
|
+
| SC-8(1) | — | ✓ | ✓ | Cryptographic Protection (TLS 1.2+ or TLS 1.3) |
|
|
347
|
+
| SC-10 | — | ✓ | ✓ | Network Disconnect |
|
|
348
|
+
| SC-12 | ✓ | ✓ | ✓ | Cryptographic Key Establishment and Management |
|
|
349
|
+
| SC-13 | ✓ | ✓ | ✓ | Cryptographic Protection (FIPS 140-2/3 validated modules) |
|
|
350
|
+
| SC-15 | ✓ | ✓ | ✓ | Collaborative Computing Devices and Applications |
|
|
351
|
+
| SC-17 | — | ✓ | ✓ | Public Key Infrastructure Certificates (PKI) |
|
|
352
|
+
| SC-18 | — | ✓ | ✓ | Mobile Code |
|
|
353
|
+
| SC-20 | ✓ | ✓ | ✓ | Secure Name/Address Resolution Service |
|
|
354
|
+
| SC-21 | ✓ | ✓ | ✓ | Secure Name/Address Resolution Service (Recursive) |
|
|
355
|
+
| SC-22 | ✓ | ✓ | ✓ | Architecture and Provisioning for Name/Address Resolution Service |
|
|
356
|
+
| SC-23 | — | ✓ | ✓ | Session Authenticity |
|
|
357
|
+
| SC-28 | ✓ | ✓ | ✓ | Protection of Information at Rest |
|
|
358
|
+
| SC-28(1) | — | ✓ | ✓ | Cryptographic Protection (AES-256 for data at rest) |
|
|
359
|
+
| SC-39 | ✓ | ✓ | ✓ | Process Isolation |
|
|
360
|
+
|
|
361
|
+
**Cryptography requirements:** SC-13 mandates FIPS 140-2 (or FIPS 140-3) validated cryptographic modules. SC-8(1) requires cryptographic protection in transit; SC-28(1) requires encryption at rest.
|
|
362
|
+
|
|
363
|
+
---
|
|
364
|
+
|
|
365
|
+
## SI — System and Information Integrity (23 controls)
|
|
366
|
+
|
|
367
|
+
| Control | L | M | H | Description |
|
|
368
|
+
|---------|---|---|---|-------------|
|
|
369
|
+
| SI-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
370
|
+
| SI-2 | ✓ | ✓ | ✓ | Flaw Remediation (patch management) |
|
|
371
|
+
| SI-2(2) | — | ✓ | ✓ | Automated Flaw Remediation Status |
|
|
372
|
+
| SI-3 | ✓ | ✓ | ✓ | Malicious Code Protection (AV/EDR) |
|
|
373
|
+
| SI-3(2) | — | ✓ | ✓ | Automatic Updates |
|
|
374
|
+
| SI-4 | ✓ | ✓ | ✓ | System Monitoring (IDS/IPS, SIEM) |
|
|
375
|
+
| SI-4(2) | — | ✓ | ✓ | Automated Tools and Mechanisms for Real-Time Analysis |
|
|
376
|
+
| SI-4(4) | — | ✓ | ✓ | Inbound and Outbound Communications Traffic |
|
|
377
|
+
| SI-4(5) | — | ✓ | ✓ | System-Generated Alerts |
|
|
378
|
+
| SI-5 | ✓ | ✓ | ✓ | Security Alerts, Advisories, and Directives |
|
|
379
|
+
| SI-6 | — | — | ✓ | Security and Privacy Function Verification |
|
|
380
|
+
| SI-7 | — | ✓ | ✓ | Software, Firmware, and Information Integrity |
|
|
381
|
+
| SI-7(1) | — | ✓ | ✓ | Integrity Checks |
|
|
382
|
+
| SI-7(7) | — | ✓ | ✓ | Integration of Detection and Response |
|
|
383
|
+
| SI-8 | — | ✓ | ✓ | Spam Protection |
|
|
384
|
+
| SI-10 | — | ✓ | ✓ | Information Input Validation |
|
|
385
|
+
| SI-12 | ✓ | ✓ | ✓ | Information Management and Retention |
|
|
386
|
+
| SI-16 | — | ✓ | ✓ | Memory Protection |
|
|
387
|
+
|
|
388
|
+
---
|
|
389
|
+
|
|
390
|
+
## SR — Supply Chain Risk Management (12 controls)
|
|
391
|
+
|
|
392
|
+
**Purpose:** Identify, assess, and mitigate risks from the supply chain (new family in Rev 5).
|
|
393
|
+
|
|
394
|
+
| Control | L | M | H | Description |
|
|
395
|
+
|---------|---|---|---|-------------|
|
|
396
|
+
| SR-1 | ✓ | ✓ | ✓ | Policy and Procedures |
|
|
397
|
+
| SR-2 | — | ✓ | ✓ | Supply Chain Risk Management Plan (SCRM Plan) |
|
|
398
|
+
| SR-2(1) | — | — | ✓ | Establish SCRM Team |
|
|
399
|
+
| SR-3 | — | ✓ | ✓ | Supply Chain Controls and Processes |
|
|
400
|
+
| SR-4 | — | ✓ | ✓ | Provenance |
|
|
401
|
+
| SR-5 | — | ✓ | ✓ | Acquisition Strategies, Tools, and Methods |
|
|
402
|
+
| SR-6 | — | ✓ | ✓ | Supplier Assessments and Reviews |
|
|
403
|
+
| SR-6(1) | — | — | ✓ | Testing and Analysis |
|
|
404
|
+
| SR-7 | — | ✓ | ✓ | Supply Chain Operations Security |
|
|
405
|
+
| SR-8 | — | ✓ | ✓ | Notification Agreements |
|
|
406
|
+
| SR-9 | — | — | ✓ | Tamper Resistance and Detection |
|
|
407
|
+
| SR-10 | — | — | ✓ | Inspection of Systems or Components |
|
|
408
|
+
| SR-11 | — | ✓ | ✓ | Component Authenticity |
|
|
409
|
+
| SR-11(1) | — | — | ✓ | Anti-Counterfeit Training |
|
|
410
|
+
| SR-12 | — | ✓ | ✓ | Component Disposal |
|
|
411
|
+
|
|
412
|
+
**EO 14028 connection:** SR family implements software supply chain security requirements. SBOMs (Software Bill of Materials) support SR-3, SR-4, and SR-11.
|
|
413
|
+
|
|
414
|
+
---
|
|
415
|
+
|
|
416
|
+
## PM — Program Management (32 controls)
|
|
417
|
+
|
|
418
|
+
**Applies at the organizational level — not specific to any system baseline.**
|
|
419
|
+
|
|
420
|
+
| Control | Description |
|
|
421
|
+
|---------|-------------|
|
|
422
|
+
| PM-1 | Information Security Program Plan |
|
|
423
|
+
| PM-2 | Information Security Program Leadership Roles (CISO) |
|
|
424
|
+
| PM-5 | System Inventory |
|
|
425
|
+
| PM-7 | Enterprise Architecture |
|
|
426
|
+
| PM-8 | Critical Infrastructure Plan |
|
|
427
|
+
| PM-9 | Risk Management Strategy |
|
|
428
|
+
| PM-10 | Authorization Process |
|
|
429
|
+
| PM-11 | Mission and Business Process Definition |
|
|
430
|
+
| PM-12 | Insider Threat Program |
|
|
431
|
+
| PM-13 | Security Workforce |
|
|
432
|
+
| PM-14 | Testing, Training, and Monitoring |
|
|
433
|
+
| PM-15 | Security and Privacy Groups and Associations |
|
|
434
|
+
| PM-16 | Threat Awareness Program |
|
|
435
|
+
| PM-17 | Protecting Controlled Unclassified Information |
|
|
436
|
+
| PM-18 | Privacy Program Plan |
|
|
437
|
+
| PM-19 | Privacy Program Leadership Roles (CPO) |
|
|
438
|
+
| PM-20 | Dissemination of Privacy Program Information |
|
|
439
|
+
| PM-21 | Accounting for PII |
|
|
440
|
+
| PM-22 | Personally Identifiable Information Quality Management |
|
|
441
|
+
| PM-23 | Data Governance Body |
|
|
442
|
+
| PM-24 | Data Integrity Board |
|
|
443
|
+
| PM-25 | Minimization of PII Used in Testing, Training, and Research |
|
|
444
|
+
| PM-26 | Complaint Management |
|
|
445
|
+
| PM-27 | Privacy Reporting |
|
|
446
|
+
| PM-28 | Risk Framing |
|
|
447
|
+
| PM-29 | Risk Management Program Leadership Roles |
|
|
448
|
+
| PM-30 | Supply Chain Risk Management Strategy |
|
|
449
|
+
| PM-31 | Continuous Monitoring Strategy |
|
|
450
|
+
| PM-32 | Purposing |
|