Skip to content

Latest commit

 

History

History
389 lines (196 loc) · 10.6 KB

acme_platform_ssp.md

File metadata and controls

389 lines (196 loc) · 10.6 KB

ACME Platform SSP

ACME Platform overview

This is the frontmatter for the ACME System Security Plan

Control responses and guidance

Access Control (AC)

AC-1 - Access Control Policy and Procedures

Control Statement

The organization:

  • [a.] Develops, documents, and disseminates to [ACME Assigned: all personnel]:

    • [1.] An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    • [2.] Procedures to facilitate the implementation of the access control policy and associated access controls; and
  • [b.] Reviews and updates the current:

    • [1.] Access control policy [ACME Assigned: monthly]; and
    • [2.] Access control procedures [ACME Assigned: weekly].

AC-1 Summary information

Table of Parameters

Parameter ID Values Label or Choices
AC-1 Personnel all personnel organization-defined personnel or roles
AC-1 Policy Frequency monthly organization-defined frequency
AC-1 Procedures Frequency weekly organization-defined frequency

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

AC-2 - Account Management

Control Statement

The organization:

  • [a.] Identifies and selects the following types of information system accounts to support organizational missions/business functions: [ACME Assigned: privileged];

  • [b.] Assigns account managers for information system accounts;

  • [c.] Establishes conditions for group and role membership;

  • [d.] Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;

  • [e.] Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts;

  • [f.] Creates, enables, modifies, disables, and removes information system accounts in accordance with [ACME Assigned: standard operations];

  • [g.] Monitors the use of information system accounts;

  • [h.] Notifies account managers:

    • [1.] When accounts are no longer required;
    • [2.] When users are terminated or transferred; and
    • [3.] When individual information system usage or need-to-know changes;
  • [i.] Authorizes access to the information system based on:

    • [1.] A valid access authorization;
    • [2.] Intended system usage; and
    • [3.] Other attributes as required by the organization or associated missions/business functions;
  • [j.] Reviews accounts for compliance with account management requirements [ACME Assigned: daily]; and

  • [k.] Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.

AC-2 Summary information

Table of Parameters

Parameter ID Values Label or Choices
ac-2_prm_1 privileged organization-defined information system account types
ac-2_prm_2 organization-defined personnel or roles
ac-2_prm_3 standard operations organization-defined procedures or conditions
ac-2_prm_4 daily organization-defined frequency

What is the solution and how is it implemented?

Component: This System

Implement properly for This System component.

Implementation Status: implemented

Implementation for part d.

Component: DB

Implement well for component DB and part d.

Implementation Status: partial

Custom Controls (CC)

CC-1 - Energy consumption

Control Statement

All services should report energy consumed by their service.

Summary information

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: IDSERVICE

Implementation Status: planned

Component: DB

Implementation Status: planned

CC-2 - Carbon reporting

Control Statement

All services must calculate and report total scope 3 energy consumption.

Summary information

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: IDSERVICE

Implementation Status: planned

Identification and Authentication (IA)

IA-5(1) - Password-based Authentication

Control Statement

The information system, for password-based authentication:

  • [(a)] Enforces minimum password complexity of [ACME Assigned: blocking the flow of the encrypted information, ACME internal method];

  • [(b)] Enforces at least the following number of changed characters when new passwords are created: [ACME Assigned: ACME internal method];

  • [(c)] Stores and transmits only cryptographically-protected passwords;

  • [(d)] Enforces password minimum and maximum lifetime restrictions of [ACME Assigned: ACME improved method];

  • [(e)] Prohibits password reuse for [ACME Assigned: ACME final method] generations; and

  • [(f)] Allows the use of a temporary password for system logons with an immediate change to a permanent password.

IA-5(1) Summary information

Table of Parameters

Parameter ID Values Label or Choices
ia-5.1_prm_1 blocking the flow of the encrypted information, ACME internal method organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type
ia-5.1_prm_2 ACME internal method organization-defined number
ia-5.1_prm_3 ACME improved method organization-defined numbers for lifetime minimum, lifetime maximum
ia-5.1_prm_4 ACME final method organization-defined number

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Implementation for part (a)

Component: IDSERVICE

Implementation Status: planned

Component: DB

Implementation Status: planned

Implementation for part (e)

Component: IDSERVICE

Implementation Status: planned

Component: DB

Implementation Status: planned

IA-5(4) - Automated Support for Password Strength Determination

Control Statement

The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy [ACME Assigned: assistants].

IA-5(4) Summary information

Table of Parameters

Parameter ID Values Label or Choices
ia-5.4_prm_1 assistants organization-defined personnel or roles

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: IDSERVICE

Implementation Status: planned

Component: DB

Implementation Status: planned

Privilege Rating (PR)

PR-1 - Right to access and deletion of records

Control Statement

Any service or offering MUST:

  • [a] Have a privacy focal to respond to deletion requests.

  • [b] Have an automated method for allowing users to access all of their data

  • [c] Have an automated method to allow users to request, and subsequently execute, deletion of personal records.

  • [d] The process must be documented.

Summary information

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: IDSERVICE

Implementation Status: planned

Component: DB

Implementation Status: planned

PR-2 - Registering exemptions to right to delete

Control Statement

Summary information

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: IDSERVICE

Implementation Status: planned

Component: DB

Implementation Status: planned

System and Communications Protection (SC)

SC-1 - System and Communications Protection Policy and Procedures

Control Statement

The organization:

  • [a.] Develops, documents, and disseminates to [ACME Assigned: as needed]:

    • [1.] A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    • [2.] Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and
  • [b.] Reviews and updates the current:

    • [1.] System and communications protection policy [ACME Assigned: hourly]; and
    • [2.] System and communications protection procedures [ACME Assigned: bi-monthly].

SC-1 Summary information

Table of Parameters

Parameter ID Values Label or Choices
sc-1_prm_1 as needed organization-defined personnel or roles
sc-1_prm_2 hourly organization-defined frequency
sc-1_prm_3 bi-monthly organization-defined frequency

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: IDSERVICE

Implementation Status: planned

SC-2 - Application Partitioning

Control Statement

The information system separates user functionality (including user interface services) from information system management functionality.

SC-2 Summary information

What is the solution and how is it implemented?

Component: This System

Implementation Status: planned

Component: DB

Implementation Status: planned