Establish, implement, and maintain a security assessment and authorization policy.
CONTROL ID 14031
CONTROL TYPE Establish/Maintain Documentation
CLASSIFICATION Preventive
SUPPORTING AND SUPPORTED CONTROLS
This Control directly supports the implied Control(s):
Establish, implement, and maintain a testing program., CC ID: 00654
This Control has the following implementation support Control(s):
Include coordination amongst entities in the security assessment and authorization policy., CC ID: 14222
Include the scope in the security assessment and authorization policy., CC ID: 14220
Include the purpose in the security assessment and authorization policy., CC ID: 14219
Disseminate and communicate the security assessment and authorization policy to interested personnel and affected parties., CC ID: 14218
Include management commitment in the security assessment and authorization policy., CC ID: 14189
Include compliance requirements in the security assessment and authorization policy., CC ID: 14183
Include roles and responsibilities in the security assessment and authorization policy., CC ID: 14179
Establish, implement, and maintain security assessment and authorization procedures., CC ID: 14056
SELECTED AUTHORITY DOCUMENTS COMPLIED WITH
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., StateRAMP Security Controls Baseline Summary Category 1, Version 1.1)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., StateRAMP Security Controls Baseline Summary Category 1, Version 1.1)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., StateRAMP Security Controls Baseline Summary Category 2, Version 1.1)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., StateRAMP Security Controls Baseline Summary Category 2, Version 1.1)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., StateRAMP Security Controls Baseline Summary Category 3, Version 1.1)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., StateRAMP Security Controls Baseline Summary Category 3, Version 1.1)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., StateRAMP Security Controls Baseline Summary High Sensitivity Level, Version 1.1)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., StateRAMP Security Controls Baseline Summary High Sensitivity Level, Version 1.1)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1. High Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
Security assessment and authorization policy [FedRAMP Assignment: at least annually]; and (CA-1b.1. High Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
Security assessment and authorization policy [FedRAMP Assignment: at least every 3 years]; and (CA-1b.1. Moderate Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1. Moderate Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1. Low Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
Security assessment and authorization policy [FedRAMP Assignment: at least every 3 years]; and (CA-1b.1. Low Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., FedRAMP Security Controls High Baseline, Version 5)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), FedRAMP Security Controls High Baseline, Version 5)
Policy [FedRAMP Assignment: at least annually] and following [Assignment: organization-defined events]; and (CA-1c.1., FedRAMP Security Controls High Baseline, Version 5)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., FedRAMP Security Controls Low Baseline, Version 5)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), FedRAMP Security Controls Low Baseline, Version 5)
Policy [FedRAMP Assignment: at least every 3 years] and following [Assignment: organization-defined events]; and (CA-1c.1., FedRAMP Security Controls Low Baseline, Version 5)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., FedRAMP Security Controls Moderate Baseline, Version 5)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), FedRAMP Security Controls Moderate Baseline, Version 5)
Policy [FedRAMP Assignment: at least every 3 years] and following [Assignment: organization-defined events]; and (CA-1c.1., FedRAMP Security Controls Moderate Baseline, Version 5)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, High Impact Baseline, October 2020)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Control Baselines for Information Systems and Organizations, NIST SP 800-53B, High Impact Baseline, October 2020)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, High Impact Baseline, October 2020)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Low Impact Baseline, October 2020)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Low Impact Baseline, October 2020)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Low Impact Baseline, October 2020)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Moderate Impact Baseline, October 2020)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Moderate Impact Baseline, October 2020)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Moderate Impact Baseline, October 2020)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Privacy Control Baseline, October 2020)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Privacy Control Baseline, October 2020)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Privacy Control Baseline, October 2020)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Baseline Controls)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Baseline Controls)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Baseline Controls)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 1 Controls)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 1 Controls)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 1 Controls)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1. Low Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1. Moderate Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1. High Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1. Low Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1. Moderate Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1. High Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, High Impact Baseline, Revision 4)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, High Impact Baseline, Revision 4)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Low Impact Baseline, Revision 4)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Low Impact Baseline, Revision 4)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Moderate Impact Baseline, Revision 4)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Moderate Impact Baseline, Revision 4)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and (CA-1c.1., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
[Selection (one or more): organization-level; mission/business process-level; system-level] assessment, authorization, and monitoring policy that: (CA-1a.1., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and (CA-1a.1(b), Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., Supply Chain Risk Management Practices for Federal Information Systems and Organizations, NIST Special Publication 800-161, April 2015)
Security assessment and authorization policy [Assignment: organization-defined frequency]; and (CA-1b.1., Supply Chain Risk Management Practices for Federal Information Systems and Organizations, NIST Special Publication 800-161, April 2015)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., TX-RAMP Security Controls Baseline Level 1)
Security assessment and authorization policy [TX-RAMP Assignment: at least every 3 years]; and (CA-1b.1., TX-RAMP Security Controls Baseline Level 1)
A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (CA-1a.1., TX-RAMP Security Controls Baseline Level 2)
Security assessment and authorization policy [TX-RAMP Assignment: at least every 3 years]; and (CA-1b.1., TX-RAMP Security Controls Baseline Level 2)