|Access Control (AC)
|C001 Establish system access requirements
|Provide privacy and security notices consistent with applicable Controlled Unclassified Information (CUI) rules.
|Limit use of portable storage devices on external systems.
|C002 Control internal system access
|Employ the principle of least privilege, including for specific security functions and privileged accounts.
|Use non-privileged accounts or roles when accessing nonsecurity functions.
|Limit unsuccessful logon attempts.
|Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
|Authorize wireless access prior to allowing such connections.
|C003 Control remote system access
|Monitor and control remote access sessions.
|Route remote access via managed access control points.
|Control the flow of CUI in accordance with approved authorizations.
|Audit & Accountability (AU)
|C007 Define audit requirements
|Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
|C008 Perform auditing
|Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation and reporting of unlawful or unauthorized system activity.
|Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
|C010 Review and manage audit logs
|Review audit logs.
|Awareness & Training (AT)
|C011 Conduct security awareness activities
|Ensure that managers, system administrators and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards and procedures related to the security of those systems.
|C012 Conduct training
|Ensure that personnel are trained to carry out their assigned information security- related duties and responsibilities.
|Configuration Management (CM)
|C013 Establish configuration baselines
|Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware and documentation) throughout the respective system development life cycles.
|Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.
|Control and monitor user-installed software.
|C014 Perform configuration and change management
|Establish and enforce security configuration settings for information technology products employed in organizational systems.
|Track, review, approve or disapprove and log changes to organizational systems.
|Analyze the security impact of changes prior to implementation.
|Identification & Authentication (IA)
|C015 Grant access to authenticated entities
|Enforce a minimum password complexity and change of characters when new passwords are created.
|Prohibit password reuse for a specified number of generations.
|Allow temporary password use for system logons with an immediate change to a permanent password.
|Store and transmit only cryptographically- protected passwords.
|Obscure feedback of authentication information.
|Incident Response (IR)
|C016 Plan incident response
|Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery and user response activities.
|C017 Detect and report events
|Detect and report events.
|Analyze and triage events to support event resolution and incident declaration.
|C018 Develop and implement a response to a declared incident
|Develop and implement responses to declared incidents according to pre- defined procedures.
Perform post incident reviews
|Perform root cause analysis on incidents to determine underlying causes.
|Perform maintenance on organizational systems.
|Provide controls on the tools, techniques, mechanisms and personnel used to conduct system maintenance.
|Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.
|Supervise the maintenance activities of personnel without required access authorization.
|Media Protection (MP)
|C023 Protect and control media
|Protect (e.g., physically control and securely store) system media containing Federal Contract Information, both paper and digital.
|Limit access to CUI on system media to authorized users.
|Control the use of removable media on system components.
|Personnel Security (PS)
|C026 Screen personnel
|Screen individuals prior to authorizing access to organizational systems containing CUI.
|C027 Protect federal contract information during personnel actions
|Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers.
|Physical Protection (PE)
|C028 Limit physical access
|Protect and monitor the physical facility and support infrastructure for organizational systems.
|C029 Manage back-ups
|Regularly perform and test data back-ups.
|Protect the confidentiality of backup CUI at storage locations.
|Risk Management (RM)
|C031 Identify and evaluate risk
|Periodically assess the risk to organizational operations (including mission, functions, image or reputation), organizational assets and individuals, resulting from the operation of organizational systems and the associated processing, storage or transmission of CUI.
|Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.
|C032 Manage risk
|Remediate vulnerabilities in accordance with risk assessments.
|Security Assessment (CA)
|C034 Develop and manage a system security plan
|Develop, document and periodically update System Security Plans (SSPs) that describe system boundaries, system environments of operation, how security requirements are implemented and the relationships with or connections to other systems.
|C035 Define and manage controls
|Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
|Develop and implement plans of action (e.g., POA&M) designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.
|System & Communications Protection (SC)
|C038 Define security requirements for systems and communications
|Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
|Use encrypted sessions for the management of network devices.
|System & Information Integrity (SI)
|CO40 Identify and manage information system flaws
|Monitor system security alerts and advisories and take action in response.
|C042 Perform network and system monitoring
|Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
|Identify unauthorized use of organizational systems.