Back

Include a description of user interactions in the user documentation.


CONTROL ID
14311
CONTROL TYPE
Establish/Maintain Documentation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Obtain user documentation before acquiring products and services., CC ID: 14283

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., StateRAMP Security Controls Baseline Summary Category 1, Version 1.1)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., StateRAMP Security Controls Baseline Summary Category 2, Version 1.1)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., StateRAMP Security Controls Baseline Summary Category 3, Version 1.1)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., StateRAMP Security Controls Baseline Summary High Sensitivity Level, Version 1.1)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2. High Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2. Moderate Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2. Low Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., FedRAMP Security Controls High Baseline, Version 5)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., FedRAMP Security Controls Low Baseline, Version 5)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., FedRAMP Security Controls Moderate Baseline, Version 5)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, High Impact Baseline, October 2020)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Low Impact Baseline, October 2020)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Moderate Impact Baseline, October 2020)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Baseline Controls)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2. Low Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2. Moderate Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2. High Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, High Impact Baseline, Revision 4)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Low Impact Baseline, Revision 4)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Moderate Impact Baseline, Revision 4)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and (SA-5b.2., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., Supply Chain Risk Management Practices for Federal Information Systems and Organizations, NIST Special Publication 800-161, April 2015)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., TX-RAMP Security Controls Baseline Level 1)
  • Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and (SA-5b.2., TX-RAMP Security Controls Baseline Level 2)