Skip to content

Instantly share code, notes, and snippets.

@bryaneaton
Last active March 2, 2023 01:51
Show Gist options
  • Save bryaneaton/989f481b7a017faa7a00102cffd23b98 to your computer and use it in GitHub Desktop.
Save bryaneaton/989f481b7a017faa7a00102cffd23b98 to your computer and use it in GitHub Desktop.
nist-formatted.json
[
{
"ID": "ac-1",
"TITLE": "Access Control Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ac-2",
"TITLE": "Account Management",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-2.1",
"TITLE": "Account Management | Automated System Account Management",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-2.2",
"TITLE": "Account Management | Removal of Temporary / Emergency Accounts",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-2.3",
"TITLE": "Account Management | Disable Inactive Accounts",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-2.4",
"TITLE": "Account Management | Automated Audit Actions",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-2.5",
"TITLE": "Account Management | Inactivity Logout",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ac-2.6",
"TITLE": "Account Management | Dynamic Privilege Management",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-2.7",
"TITLE": "Account Management | Role-Based Schemes",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-2.8",
"TITLE": "Account Management | Dynamic Account Creation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-2.9",
"TITLE": "Account Management | Restrictions on Use of Shared Groups / Accounts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-2.10",
"TITLE": "Account Management | Shared / Group Account Credential Termination",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-2.11",
"TITLE": "Account Management | Usage Conditions",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "ac-2.12",
"TITLE": "Account Management | Account Monitoring / Atypical Usage",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-2.13",
"TITLE": "Account Management | Disable Accounts For High-Risk Individuals",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-3",
"TITLE": "Access Enforcement",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-3.1",
"TITLE": "Access Enforcement | Restricted Access to Privileged Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.2",
"TITLE": "Access Enforcement | Dual Authorization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.3",
"TITLE": "Access Enforcement | Mandatory Access Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.4",
"TITLE": "Access Enforcement | Discretionary Access Control",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-3.5",
"TITLE": "Access Enforcement | Security-Relevant Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.6",
"TITLE": "Access Enforcement | Protection of User and System Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.7",
"TITLE": "Access Enforcement | Role-Based Access Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.8",
"TITLE": "Access Enforcement | Revocation of Access Authorizations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.9",
"TITLE": "Access Enforcement | Controlled Release",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-3.10",
"TITLE": "Access Enforcement | Audited Override of Access Control Mechanisms",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4",
"TITLE": "Information Flow Enforcement",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-4.1",
"TITLE": "Information Flow Enforcement | Object Security Attributes",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.2",
"TITLE": "Information Flow Enforcement | Processing Domains",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.3",
"TITLE": "Information Flow Enforcement | Dynamic Information Flow Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.4",
"TITLE": "Information Flow Enforcement | Content Check Encrypted Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.5",
"TITLE": "Information Flow Enforcement | Embedded Data Types",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.6",
"TITLE": "Information Flow Enforcement | Metadata",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.7",
"TITLE": "Information Flow Enforcement | One-Way Flow Mechanisms",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.8",
"TITLE": "Information Flow Enforcement | Security Policy Filters",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.9",
"TITLE": "Information Flow Enforcement | Human Reviews",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.10",
"TITLE": "Information Flow Enforcement | Enable / Disable Security Policy Filters",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.11",
"TITLE": "Information Flow Enforcement | Configuration of Security Policy Filters",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.12",
"TITLE": "Information Flow Enforcement | Data Type Identifiers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.13",
"TITLE": "Information Flow Enforcement | Decomposition Into Policy-Relevant Subcomponents",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.14",
"TITLE": "Information Flow Enforcement | Security Policy Filter Constraints",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.15",
"TITLE": "Information Flow Enforcement | Detection of Unsanctioned Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.16",
"TITLE": "Information Flow Enforcement | Information Transfers on Interconnected Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.17",
"TITLE": "Information Flow Enforcement | Domain Authentication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.18",
"TITLE": "Information Flow Enforcement | Security Attribute Binding",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.19",
"TITLE": "Information Flow Enforcement | Validation of Metadata",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.20",
"TITLE": "Information Flow Enforcement | Approved Solutions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.21",
"TITLE": "Information Flow Enforcement | Physical / Logical Separation of Information Flows",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-4.22",
"TITLE": "Information Flow Enforcement | Access Only",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-5",
"TITLE": "Separation of Duties",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6",
"TITLE": "Least Privilege",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.1",
"TITLE": "Least Privilege | Authorize Access to Security Functions",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.2",
"TITLE": "Least Privilege | Non-Privileged Access For Nonsecurity Functions",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.3",
"TITLE": "Least Privilege | Network Access to Privileged Commands",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "ac-6.4",
"TITLE": "Least Privilege | Separate Processing Domains",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-6.5",
"TITLE": "Least Privilege | Privileged Accounts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.6",
"TITLE": "Least Privilege | Privileged Access by Non-Organizational Users",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-6.7",
"TITLE": "Least Privilege | Review of User Privileges",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.8",
"TITLE": "Least Privilege | Privilege Levels For Code Execution",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.9",
"TITLE": "Least Privilege | Auditing Use of Privileged Functions",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-6.10",
"TITLE": "Least Privilege | Prohibit Nonprivileged Users from Executing Privileged Functions",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-7",
"TITLE": "Unsuccessful Logon Attempts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ac-7.1",
"TITLE": "Unsuccessful Logon Attempts | Automatic Account Lock",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-7.2",
"TITLE": "Unsuccessful Logon Attempts | Purge/Wipe Mobile Device",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-8",
"TITLE": "System Use Notification",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-9",
"TITLE": "Previous Logon (Access) Notification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-9.1",
"TITLE": "Previous Logon Notification | Unsuccessful Logons",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-9.2",
"TITLE": "Previous Logon Notification | Successful / Unsuccessful Logons",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-9.3",
"TITLE": "Previous Logon Notification | Notification of Account Changes",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-9.4",
"TITLE": "Previous Logon Notification | Additional Logon Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-10",
"TITLE": "Concurrent Session Control",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ac-11",
"TITLE": "Session Lock",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-11.1",
"TITLE": "Session Lock | Pattern-Hiding Displays",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-12",
"TITLE": "Session Termination",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-12.1",
"TITLE": "Session Termination | User-initiated Logouts / Message Displays",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-13",
"TITLE": "Supervision and Review \u2014 Access Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-14",
"TITLE": "Permitted Actions Without Identification or Authentication",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-14.1",
"TITLE": "Permitted Actions Without Identification or Authentication | Necessary Uses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-15",
"TITLE": "Automated Marking",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16",
"TITLE": "Security Attributes",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-16.1",
"TITLE": "Security Attributes | Dynamic Attribute Association",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.2",
"TITLE": "Security Attributes | Attribute Value Changes by Authorized Individuals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.3",
"TITLE": "Security Attributes | Maintenance of Attribute Associations by Information System",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.4",
"TITLE": "Security Attributes | Association of Attributes by Authorized Individuals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.5",
"TITLE": "Security Attributes | Attribute Displays For Output Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.6",
"TITLE": "Security Attributes | Maintenance of Attribute Association by Organization",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-16.7",
"TITLE": "Security Attributes | Consistent Attribute Interpretation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.8",
"TITLE": "Security Attributes | Association Techniques / Technologies",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.9",
"TITLE": "Security Attributes | Attribute Reassignment",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-16.10",
"TITLE": "Security Attributes | Attribute Configuration by Authorized Individuals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-17",
"TITLE": "Remote Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-17.1",
"TITLE": "Remote Access | Automated Monitoring / Control",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-17.2",
"TITLE": "Remote Access | Protection of Confidentiality / Integrity Using Encryption",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-17.3",
"TITLE": "Remote Access | Managed Access Control Points",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-17.4",
"TITLE": "Remote Access | Privileged Commands / Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-17.5",
"TITLE": "Remote Access | Monitoring For Unauthorized Connections",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-17.6",
"TITLE": "Remote Access | Protection of Information",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-17.7",
"TITLE": "Remote Access | Additional Protection For Security Function Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-17.8",
"TITLE": "Remote Access | Disable Nonsecure Network Protocols",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-17.9",
"TITLE": "Remote Access | Disconnect / Disable Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-18",
"TITLE": "Wireless Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-18.1",
"TITLE": "Wireless Access | Authentication and Encryption",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-18.2",
"TITLE": "Wireless Access | Monitoring Unauthorized Connections",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-18.3",
"TITLE": "Wireless Access | Disable Wireless Networking",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-18.4",
"TITLE": "Wireless Access | Restrict Configurations by Users",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-18.5",
"TITLE": "Wireless Access | Antennas / Transmission Power Levels",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "ac-19",
"TITLE": "Access Control For Mobile Devices",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-19.1",
"TITLE": "Access Control For Mobile Devices | Use of Writable / Portable Storage Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-19.2",
"TITLE": "Access Control For Mobile Devices | Use of Personally Owned Portable Storage Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-19.3",
"TITLE": "Access Control For Mobile Devices | Use of Portable Storage Devices with No Identifiable Owner",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-19.4",
"TITLE": "Access Control For Mobile Devices | Restrictions For Classified Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-19.5",
"TITLE": "Access Control For Mobile Devices | Full Device / Container-Based Encryption",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ac-20",
"TITLE": "Use of External Information Systems",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-20.1",
"TITLE": "Use of External Information Systems | Limits on Authorized Use",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-20.2",
"TITLE": "Use of External Information Systems | Portable Storage Devices",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-20.3",
"TITLE": "Use of External Information Systems | Non-Organizationally Owned Systems / Components / Devices",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ac-20.4",
"TITLE": "Use of External Information Systems | Network Accessible Storage Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-21",
"TITLE": "Information Sharing",
"Confidentiality": "Moderate",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-21.1",
"TITLE": "Information Sharing | Automated Decision Support",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-21.2",
"TITLE": "Information Sharing | Information Search and Retrieval",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-22",
"TITLE": "Publicly Accessible Content",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-23",
"TITLE": "Data Mining Protection",
"Confidentiality": "Moderate",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-24",
"TITLE": "Access Control Decisions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-24.1",
"TITLE": "Access Control Decisions | Transmit Access Authorization Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-24.2",
"TITLE": "Access Control Decisions | No User or Process Identity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ac-25",
"TITLE": "Reference Monitor",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "at-1",
"TITLE": "Security Awareness and Training Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-2",
"TITLE": "Security Awareness Training",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-2.1",
"TITLE": "Security Awareness | Practical Exercises",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "at-2.2",
"TITLE": "Security Awareness | Insider Threat",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-3",
"TITLE": "Role-Based Security Training",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-3.1",
"TITLE": "Security Training | Environmental Controls",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "at-3.2",
"TITLE": "Security Training | Physical Security Controls",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-3.3",
"TITLE": "Security Training | Practical Exercises",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "at-3.4",
"TITLE": "Security Training | Suspicious Communications and Anomalous System Behavior",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-4",
"TITLE": "Security Training Records",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "at-5",
"TITLE": "Contacts With Security Groups and Associations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-1",
"TITLE": "Audit and Accountability Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "au-2",
"TITLE": "Audit Events",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-2.1",
"TITLE": "Audit Events | Compilation of Audit Records From Multiple Sources",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-2.2",
"TITLE": "Audit Events | Selection of Audit Events by Component",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-2.3",
"TITLE": "Audit Events | Reviews and Updates",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-2.4",
"TITLE": "Audit Events | Privileged Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-3",
"TITLE": "Content of Audit Records",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-3.1",
"TITLE": "Content of Audit Records | Additional Audit Information",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-3.2",
"TITLE": "Content of Audit Records | Centralized Management of Planned Audit Record Content",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "au-4",
"TITLE": "Audit Storage Capacity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "au-4.1",
"TITLE": "Audit Storage Capacity | Transfer to Alternate Storage",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "au-5",
"TITLE": "Response to Audit Processing Failures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "au-5.1",
"TITLE": "Response to Audit Processing Failures | Audit Storage Capacity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "au-5.2",
"TITLE": "Response to Audit Processing Failures | Real-Time Alerts",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "au-5.3",
"TITLE": "Response to Audit Processing Failures | Configurable Traffic Volume Thresholds",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-5.4",
"TITLE": "Response to Audit Processing Failures | Shutdown on Failure",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-6",
"TITLE": "Audit Review, Analysis, and Reporting",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-6.1",
"TITLE": "Audit Review, Analysis, and Reporting | Process Integration",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-6.2",
"TITLE": "Audit Review, Analysis, and Reporting | Automated Security Alerts",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-6.3",
"TITLE": "Audit Review, Analysis, and Reporting | Correlate Audit Repositories",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-6.4",
"TITLE": "Audit Review, Analysis, and Reporting | Central Review and Analysis",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-6.5",
"TITLE": "Audit Review, Analysis, and Reporting | Integration / Scanning and Monitoring Capabilities",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "au-6.6",
"TITLE": "Audit Review, Analysis, and Reporting | Correlation With Physical Monitoring",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "au-6.7",
"TITLE": "Audit Review, Analysis, and Reporting | Permitted Actions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-6.8",
"TITLE": "Audit Review, Analysis, and Reporting | Full Text Analysis of Privileged Commands",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-6.9",
"TITLE": "Audit Review, Analysis, and Reporting | Correlation with Information from Nontechnical Sources",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-6.10",
"TITLE": "Audit Review, Analysis, and Reporting | Audit Level Adjustment",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-7",
"TITLE": "Audit Reduction and Report Generation",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "au-7.1",
"TITLE": "Audit Reduction and Report Generation | Automatic Processing",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "au-7.2",
"TITLE": "Audit Reduction and Report Generation | Automatic Sort and Search",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-8",
"TITLE": "Time Stamps",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-8.1",
"TITLE": "Time Stamps | Synchronization With Authoritative Time Source",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-8.2",
"TITLE": "Time Stamps | Secondary Authoritative Time Source",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-9",
"TITLE": "Protection of Audit Information",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "au-9.1",
"TITLE": "Protection of Audit Information | Hardware Write-Once Media",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-9.2",
"TITLE": "Protection of Audit Information | Audit Backup on Separate Physical Systems / Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "au-9.3",
"TITLE": "Protection of Audit Information | Cryptographic Protection",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "au-9.4",
"TITLE": "Protection of Audit Information | Access by Subset of Privileged Users",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-9.5",
"TITLE": "Protection of Audit Information | Dual Authorization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-9.6",
"TITLE": "Protection of Audit Information | Read Only Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-10",
"TITLE": "Non-Repudiation",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "au-10.1",
"TITLE": "Non-Repudiation | Association of Identities",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-10.2",
"TITLE": "Non-Repudiation | Validate Binding of Information Producer Identity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-10.3",
"TITLE": "Non-Repudiation | Chain of Custody",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-10.4",
"TITLE": "Non-Repudiation | Validate Binding of Information Reviewer Identity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-10.5",
"TITLE": "Non-Repudiation | Digital Signatures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-11",
"TITLE": "Audit Record Retention",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "au-11.1",
"TITLE": "Audit Record Retention | Long-Term Retrieval Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "au-12",
"TITLE": "Audit Generation",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-12.1",
"TITLE": "Audit Generation | System-Wide / Time-Correlated Audit Trail",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-12.2",
"TITLE": "Audit Generation | Standardized Formats",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-12.3",
"TITLE": "Audit Generation | Changes by Authorized Individuals",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-13",
"TITLE": "Monitoring For Information Disclosure",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-13.1",
"TITLE": "Monitoring For Information Disclosure | Use of Automated Tools",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-13.2",
"TITLE": "Monitoring For Information Disclosure | Review of Monitored Sites",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-14",
"TITLE": "Session Audit",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-14.1",
"TITLE": "Session Audit | System Start-Up",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-14.2",
"TITLE": "Session Audit | Capture/Record and Log Content",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "au-14.3",
"TITLE": "Session Audit | Remote Viewing / Listening",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-15",
"TITLE": "Alternate Audit Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-16",
"TITLE": "Cross-Organizational Auditing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-16.1",
"TITLE": "Cross-Organizational Auditing | Identity Preservation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "au-16.2",
"TITLE": "Cross-Organizational Auditing | Sharing of Audit Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-1",
"TITLE": "Security Assessment and Authorization Policies and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ca-2",
"TITLE": "Security Assessments",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ca-2.1",
"TITLE": "Security Assessments | Independent Assessors",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ca-2.2",
"TITLE": "Security Assessments | Specialized Assessments",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ca-2.3",
"TITLE": "Security Assessments | External Organizations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-3",
"TITLE": "System Interconnections",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ca-3.1",
"TITLE": "System Interconnections | Unclassified National Security System Connections",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-3.2",
"TITLE": "System Interconnections | Classified National Security System Connections",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-3.3",
"TITLE": "System Interconnections | Unclassified Non-National Security System Connections",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-3.4",
"TITLE": "System Interconnections | Connections to Public Networks",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-3.5",
"TITLE": "System Interconnections | Restrictions on External Network Connections",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ca-4",
"TITLE": "Security Certification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-5",
"TITLE": "Plan of Action and Milestones",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ca-5.1",
"TITLE": "Plan of Action and Milestones | Automation Support For Accuracy / Currency",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-6",
"TITLE": "Security Authorization",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ca-7",
"TITLE": "Continuous Monitoring",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ca-7.1",
"TITLE": "Continuous Monitoring | Independent Assessment",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ca-7.2",
"TITLE": "Continuous Monitoring | Types of Assessments",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-7.3",
"TITLE": "Continuous Monitoring | Trend Analyses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-8",
"TITLE": "Penetration Testing",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "ca-8.1",
"TITLE": "Penetration Testing | Independent Penetration Agent or Team",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-8.2",
"TITLE": "Penetration Testing | Red Team Exercises",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ca-9",
"TITLE": "Internal System Connections",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ca-9.1",
"TITLE": "Internal System Connections | Security Compliance Checks",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-1",
"TITLE": "Configuration Management Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-2",
"TITLE": "Baseline Configuration",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-2.1",
"TITLE": "Baseline Configuration | Reviews and Updates",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-2.2",
"TITLE": "Baseline Configuration | Automation Support For Accuracy / Currency",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-2.3",
"TITLE": "Baseline Configuration | Retention of Previous Configurations",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-2.4",
"TITLE": "Baseline Configuration | Unauthorized Software",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-2.5",
"TITLE": "Baseline Configuration | Authorized Software",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-2.6",
"TITLE": "Baseline Configuration | Development and Test Environments",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-2.7",
"TITLE": "Baseline Configuration | Configure Systems, Components, or Devices for High-Risk Areas",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-3",
"TITLE": "Configuration Change Control",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-3.1",
"TITLE": "Configuration Change Control | Automated Document / Notification / Prohibition of Changes",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-3.2",
"TITLE": "Configuration Change Control | Test / Validate / Document Changes",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-3.3",
"TITLE": "Configuration Change Control | Automated Change Implementation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-3.4",
"TITLE": "Configuration Change Control | Security Representative",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-3.5",
"TITLE": "Configuration Change Control | Automated Security Response",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-3.6",
"TITLE": "Configuration Change Control | Cryptography Management",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-4",
"TITLE": "Security Impact Analysis",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-4.1",
"TITLE": "Security Impact Analysis | Separate Test Environments",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-4.2",
"TITLE": "Security Impact Analysis | Verification of Security Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-5",
"TITLE": "Access Restrictions For Change",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-5.1",
"TITLE": "Access Restrictions For Change | Automated Access Enforcement / Auditing",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-5.2",
"TITLE": "Access Restrictions For Change | Review System Changes",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-5.3",
"TITLE": "Access Restrictions For Change | Signed Components",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-5.4",
"TITLE": "Access Restrictions For Change | Dual Authorization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-5.5",
"TITLE": "Access Restrictions For Change | Limit Production / Operational Privileges",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-5.6",
"TITLE": "Access Restrictions For Change | Limit Library Privileges",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-5.7",
"TITLE": "Access Restrictions For Change | Automatic Implementation of Security Safeguards",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-6",
"TITLE": "Configuration Settings",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-6.1",
"TITLE": "Configuration Settings | Automated Central Management / Application / Verification",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-6.2",
"TITLE": "Configuration Settings | Respond to Unauthorized Changes",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-6.3",
"TITLE": "Configuration Settings | Unauthorized Change Detection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-6.4",
"TITLE": "Configuration Settings | Conformance Demonstration",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-7",
"TITLE": "Least Functionality",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-7.1",
"TITLE": "Least Functionality | Periodic Review",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-7.2",
"TITLE": "Least Functionality | Prevent Program Execution",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-7.3",
"TITLE": "Least Functionality | Registration Compliance",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-7.4",
"TITLE": "Least Functionality | Unauthorized Software / Blacklisting",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-7.5",
"TITLE": "Least Functionality | Authorized Software / Whitelisting",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-8",
"TITLE": "Information System Component Inventory",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-8.1",
"TITLE": "Information System Component Inventory | Updates During Installations / Removals",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-8.2",
"TITLE": "Information System Component Inventory | Automated Maintenance",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-8.3",
"TITLE": "Information System Component Inventory | Automated Unauthorized Component Detection",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-8.4",
"TITLE": "Information System Component Inventory | Accountability Information",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-8.5",
"TITLE": "Information System Component Inventory | No Duplicate Accounting of Components",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "cm-8.6",
"TITLE": "Information System Component Inventory | Assessed Configurations / Approved Deviations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-8.7",
"TITLE": "Information System Component Inventory | Centralized Repository",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-8.8",
"TITLE": "Information System Component Inventory | Automated Location Tracking",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-8.9",
"TITLE": "Information System Component Inventory | Assignment of Components to Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-9",
"TITLE": "Configuration Management Plan",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-9.1",
"TITLE": "Configuration Management Plan | Assignment of Responsibility",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cm-10",
"TITLE": "Software Usage Restrictions",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-10.1",
"TITLE": "Software Usage Restrictions | Open Source Software",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-11",
"TITLE": "User-Installed Software",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cm-11.1",
"TITLE": "User-Installed Software | Alerts For Unauthorized Installations",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "cm-11.2",
"TITLE": "User-Installed Software | Prohibit Installation without Privileged Status",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "cp-1",
"TITLE": "Contingency Planning Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "cp-2",
"TITLE": "Contingency Plan",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "cp-2.1",
"TITLE": "Contingency Plan | Coordinate With Related Plans",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-2.2",
"TITLE": "Contingency Plan | Capacity Planning",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-2.3",
"TITLE": "Contingency Plan | Resume Essential Missions / Business Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-2.4",
"TITLE": "Contingency Plan | Resume All Missions / Business Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-2.5",
"TITLE": "Contingency Plan | Continue Essential Missions / Business Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-2.6",
"TITLE": "Contingency Plan | Alternate Processing / Storage Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-2.7",
"TITLE": "Contingency Plan | Coordinate With External Service Providers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-2.8",
"TITLE": "Contingency Plan | Identify Critical Assets",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-3",
"TITLE": "Contingency Training",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "cp-3.1",
"TITLE": "Contingency Training | Simulated Events",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-3.2",
"TITLE": "Contingency Training | Automated Training Environments",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-4",
"TITLE": "Contingency Plan Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "cp-4.1",
"TITLE": "Contingency Plan Testing | Coordinate With Related Plans",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-4.2",
"TITLE": "Contingency Plan Testing | Alternate Processing Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-4.3",
"TITLE": "Contingency Plan Testing | Automated Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-4.4",
"TITLE": "Contingency Plan Testing | Full Recovery / Reconstitution",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-5",
"TITLE": "Contingency Plan Update",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-6",
"TITLE": "Alternate Storage Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-6.1",
"TITLE": "Alternate Storage Site | Separation From Primary Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-6.2",
"TITLE": "Alternate Storage Site | Recovery Time / Point Objectives",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-6.3",
"TITLE": "Alternate Storage Site | Accessibility",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-7",
"TITLE": "Alternate Processing Site",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "cp-7.1",
"TITLE": "Alternate Processing Site | Separation From Primary Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-7.2",
"TITLE": "Alternate Processing Site | Accessibility",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-7.3",
"TITLE": "Alternate Processing Site | Priority of Service",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-7.4",
"TITLE": "Alternate Processing Site | Preparation for Use",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-7.5",
"TITLE": "Alternate Processing Site | Equivalent Information Security Safeguards",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-7.6",
"TITLE": "Alternate Processing Site | Inability to Return to Primary Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-8",
"TITLE": "Telecommunications Services",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-8.1",
"TITLE": "Telecommunications Services | Priority of Service Provisions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-8.2",
"TITLE": "Telecommunications Services | Single Points of Failure",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-8.3",
"TITLE": "Telecommunications Services | Separation of Primary / Alternate Providers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-8.4",
"TITLE": "Telecommunications Services | Provider Contingency Plan",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-8.5",
"TITLE": "Telecommunications Services | Alternate Telecommunication Service Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-9",
"TITLE": "Information System Backup",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "cp-9.1",
"TITLE": "Information System Backup | Testing For Reliability / Integrity",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "cp-9.2",
"TITLE": "Information System Backup | Test Restoration Using Sampling",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-9.3",
"TITLE": "Information System Backup | Separate Storage for Critical Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "cp-9.4",
"TITLE": "Information System Backup | Protection From Unauthorized Modification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-9.5",
"TITLE": "Information System Backup | Transfer to Alternate Storage Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "cp-9.6",
"TITLE": "Information System Backup | Redundant Secondary System",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-9.7",
"TITLE": "Information System Backup | Dual Authorization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-10",
"TITLE": "Information System Recovery and Reconstitution",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "cp-10.1",
"TITLE": "Information System Recovery and Reconstitution | Contingency Plan Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-10.2",
"TITLE": "Information System Recovery and Reconstitution | Transaction Recovery",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "cp-10.3",
"TITLE": "Information System Recovery and Reconstitution | Compensating Security Controls",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-10.4",
"TITLE": "Information System Recovery and Reconstitution | Restore Within Time Period",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "cp-10.5",
"TITLE": "Information System Recovery and Reconstitution | Failover Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-10.6",
"TITLE": "Information System Recovery and Reconstitution | Component Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-11",
"TITLE": "Alternate Communications Protocols",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-12",
"TITLE": "Safe Mode",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "cp-13",
"TITLE": "Alternative Security Mechanisms",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-1",
"TITLE": "Identification and Authentication Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2",
"TITLE": "Identification and Authentication (Organizational Users)",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.1",
"TITLE": "Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.2",
"TITLE": "Identification and Authentication (Organizational Users) | Network Access to Non-Privileged Accounts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.3",
"TITLE": "Identification and Authentication (Organizational Users) | Local Access to Privileged Accounts",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ia-2.4",
"TITLE": "Identification and Authentication (Organizational Users) | Local Access to Non-Privileged Accounts",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ia-2.5",
"TITLE": "Identification and Authentication (Organizational Users) | Group Authentication",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.6",
"TITLE": "Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts - Separate Device",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-2.7",
"TITLE": "Identification and Authentication (Organizational Users) | Network Access to Non-Privileged Accounts - Separate Device",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-2.8",
"TITLE": "Identification and Authentication (Organizational Users) | Network Access to Privileged Accounts - Replay Resistant",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.9",
"TITLE": "Identification and Authentication (Organizational Users) | Network Access to Non-Privileged Accounts - Replay Resistant",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ia-2.10",
"TITLE": "Identification and Authentication (Organizational Users) | Single Sign-On",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-2.11",
"TITLE": "Identification and Authentication (Organizational Users) | Remote Access - Separate Device",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.12",
"TITLE": "Identification and Authentication (Organizational Users) | Acceptance of PIV Credentials",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-2.13",
"TITLE": "Identification and Authentication | Out-of-Band Authentication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-3",
"TITLE": "Device Identification and Authentication",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-3.1",
"TITLE": "Device Identification and Authentication | Cryptographic Bidirectional Authentication",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ia-3.2",
"TITLE": "Device Identification and Authentication | Cryptographic Bidirectional Network Authentication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-3.3",
"TITLE": "Device Identification and Authentication | Dynamic Address Allocation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-3.4",
"TITLE": "Device Identification and Authentication | Device Attestation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-4",
"TITLE": "Identifier Management",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-4.1",
"TITLE": "Identifier Management | Prohibit Account Identifiers As Public Identifiers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-4.2",
"TITLE": "Identifier Management | Supervisor Authorization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-4.3",
"TITLE": "Identifier Management | Multiple Forms of Certification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-4.4",
"TITLE": "Identifier Management | Identify User Status",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-4.5",
"TITLE": "Identifier Management | Dynamic Management",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-4.6",
"TITLE": "Identifier Management | Cross-Organization Management",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-4.7",
"TITLE": "Identifier Management | In Person Registration",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5",
"TITLE": "Authenticator Management",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.1",
"TITLE": "Authenticator Management | Password-Based Authentication",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.2",
"TITLE": "Authenticator Management | PKI-Based Authentication",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ia-5.3",
"TITLE": "Authenticator Management | In Person or Trusted Third-Party Registration",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ia-5.4",
"TITLE": "Authenticator Management | Automated Support for Password Strength Determination",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.5",
"TITLE": "Authenticator Management | Change Authenticators Prior to Delivery",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5.6",
"TITLE": "Authenticator Management | Protection of Authenticators",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5.7",
"TITLE": "Authenticator Management | No Embedded Unencrypted Static Authenticators",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5.8",
"TITLE": "Authenticator Management | Multiple Information System Accounts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.9",
"TITLE": "Authenticator Management | Cross-Organization Credential Management",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5.10",
"TITLE": "Authenticator Management | Dynamic Credential Association",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5.11",
"TITLE": "Authenticator Management | Hardware Token-Based Authentication",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.12",
"TITLE": "Authenticator Management | Biometric Authentication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-5.13",
"TITLE": "Authenticator Management | Expiration of Cached Authenticators",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.14",
"TITLE": "Authenticator Management | Managing Content of PKI Trust stores",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-5.15",
"TITLE": "Authenticator Management | FICAM-Approved Products and Services",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-6",
"TITLE": "Authenticator Feedback",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-7",
"TITLE": "Cryptographic Module Authentication",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-8",
"TITLE": "Identification and Authentication (Non-Organizational Users)",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-8.1",
"TITLE": "Identification and Authentication (Non-Organizational Users) | Acceptance of PIV Credentials from Other Agencies",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-8.2",
"TITLE": "Identification and Authentication (Non-Organizational Users) | Acceptance of Third- Party Credentials",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-8.3",
"TITLE": "Identification and Authentication (Non-Organizational Users) | Use of FICAM- Approved Products",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-8.4",
"TITLE": "Identification and Authentication (Non-Organizational Users) | Use of FICAM-Issued Profiles",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ia-8.5",
"TITLE": "Identification and Authentication (Non-Organizational Users) | Acceptance of PIV-I Credentials",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-9",
"TITLE": "Service Identification and Authentication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-9.1",
"TITLE": "Service Identification and Authentication | Information Exchange",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-9.2",
"TITLE": "Service Identification and Authentication | Transmission of Decisions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ia-10",
"TITLE": "Adaptive Identification and Authentication",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "ia-11",
"TITLE": "Re-authentication",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "ir-1",
"TITLE": "Incident Response Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-2",
"TITLE": "Incident Response Training",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-2.1",
"TITLE": "Incident Response Training | Simulated Events",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ir-2.2",
"TITLE": "Incident Response Training | Automated Training Environments",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ir-3",
"TITLE": "Incident Response Testing",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-3.1",
"TITLE": "Incident Response Testing | Automated Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-3.2",
"TITLE": "Incident Response Testing | Coordination With Related Plans",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ir-4",
"TITLE": "Incident Handling",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-4.1",
"TITLE": "Incident Handling | Automated Incident Handling Processes",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ir-4.2",
"TITLE": "Incident Handling | Dynamic Reconfiguration",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-4.3",
"TITLE": "Incident Handling | Continuity of Operations",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ir-4.4",
"TITLE": "Incident Handling | Information Correlation",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-4.5",
"TITLE": "Incident Handling | Automatic Disabling of Information System",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-4.6",
"TITLE": "Incident Handling | Insider Threats - Specific Capabilities",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-4.7",
"TITLE": "Incident Handling | Insider Threats - Intra-Organization Coordination",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-4.8",
"TITLE": "Incident Handling | Correlation With External Organizations",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-4.9",
"TITLE": "Incident Handling | Dynamic Response Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-4.10",
"TITLE": "Incident Handling | Supply Chain Coordination",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-5",
"TITLE": "Incident Monitoring",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-5.1",
"TITLE": "Incident Monitoring | Automated Tracking / Data Collection / Analysis",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ir-6",
"TITLE": "Incident Reporting",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-6.1",
"TITLE": "Incident Reporting | Automated Reporting",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ir-6.2",
"TITLE": "Incident Reporting | Vulnerabilities Related to Incidents",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-6.3",
"TITLE": "Incident Reporting | Coordination With Supply Chain",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-7",
"TITLE": "Incident Response Assistance",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-7.1",
"TITLE": "Incident Response Assistance | Automation Support For Availability of Information / Support",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ir-7.2",
"TITLE": "Incident Response Assistance | Coordination With External Providers",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-8",
"TITLE": "Incident Response Plan",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ir-9",
"TITLE": "Information Spillage Response",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-9.1",
"TITLE": "Information Spillage Response | Responsible Personnel",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-9.2",
"TITLE": "Information Spillage Response | Training",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-9.3",
"TITLE": "Information Spillage Response | Post-Spill Operations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "ir-9.4",
"TITLE": "Information Spillage Response | Exposure to Unauthorized Personnel",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ir-10",
"TITLE": "Integrated Information Security Cell",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "ma-1",
"TITLE": "System Maintenance Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ma-2",
"TITLE": "Controlled Maintenance",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ma-2.1",
"TITLE": "Controlled Maintenance | Record Content",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-2.2",
"TITLE": "Controlled Maintenance | Automated Maintenance Activities",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ma-3",
"TITLE": "Maintenance Tools",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ma-3.1",
"TITLE": "Maintenance Tools | Inspect Tools",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ma-3.2",
"TITLE": "Maintenance Tools | Inspect Media",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ma-3.3",
"TITLE": "Maintenance Tools | Prevent Unauthorized Removal",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-3.4",
"TITLE": "Maintenance Tools | Restricted Tool Use",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-4",
"TITLE": "Nonlocal Maintenance",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ma-4.1",
"TITLE": "Nonlocal Maintenance | Auditing and Review",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ma-4.2",
"TITLE": "Nonlocal Maintenance | Document Nonlocal Maintenance",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "ma-4.3",
"TITLE": "Nonlocal Maintenance | Comparable Security / Sanitization",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ma-4.4",
"TITLE": "Nonlocal Maintenance | Authentication / Separation of Maintenance Sessions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-4.5",
"TITLE": "Nonlocal Maintenance | Approvals and Notifications",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-4.6",
"TITLE": "Nonlocal Maintenance | Cryptographic Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ma-4.7",
"TITLE": "Nonlocal Maintenance | Remote Disconnect Verification",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ma-5",
"TITLE": "Maintenance Personnel",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ma-5.1",
"TITLE": "Maintenance Personnel | Individuals Without Appropriate Access",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ma-5.2",
"TITLE": "Maintenance Personnel | Security Clearances For Classified Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-5.3",
"TITLE": "Maintenance Personnel | Citizenship Requirements For Classified Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-5.4",
"TITLE": "Maintenance Personnel | Foreign Nationals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-5.5",
"TITLE": "Maintenance Personnel | Non System-Related Maintenance",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-6",
"TITLE": "Timely Maintenance",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "ma-6.1",
"TITLE": "Timely Maintenance | Preventive Maintenance",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-6.2",
"TITLE": "Timely Maintenance | Predictive Maintenance",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ma-6.3",
"TITLE": "Timely Maintenance | Automated Support for Predictive Maintenance",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-1",
"TITLE": "Media Protection Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "mp-2",
"TITLE": "Media Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "mp-2.1",
"TITLE": "Media Access | Automated Restricted Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-2.2",
"TITLE": "Media Access | Cryptographic Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-3",
"TITLE": "Media Marking",
"Confidentiality": "Moderate",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-4",
"TITLE": "Media Storage",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "mp-4.1",
"TITLE": "Media Storage | Cryptographic Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-4.2",
"TITLE": "Media Storage | Automated Restricted Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-5",
"TITLE": "Media Transport",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "mp-5.1",
"TITLE": "Media Transport | Protection Outside of Controlled Areas",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-5.2",
"TITLE": "Media Transport | Documentation of Activities",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-5.3",
"TITLE": "Media Transport | Custodians",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-5.4",
"TITLE": "Media Transport | Cryptographic Protection",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "mp-6",
"TITLE": "Media Sanitization",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.1",
"TITLE": "Media Sanitization | Review / Approve / Track / Document / Verify",
"Confidentiality": "High",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.2",
"TITLE": "Media Sanitization | Equipment Testing",
"Confidentiality": "High",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.3",
"TITLE": "Media Sanitization | Nondestructive Techniques",
"Confidentiality": "High",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.4",
"TITLE": "Media Sanitization | Controlled Unclassified Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.5",
"TITLE": "Media Sanitization | Classified Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.6",
"TITLE": "Media Sanitization | Media Destruction",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.7",
"TITLE": "Media Sanitization | Dual Authorization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-6.8",
"TITLE": "Media Sanitization | Remote Purging / Wiping of Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-7",
"TITLE": "Media Use",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "mp-7.1",
"TITLE": "Media Use | Prohibit Use without Owner",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "mp-7.2",
"TITLE": "Media Use | Prohibit Use of Sanitization-Resistant Media",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-8",
"TITLE": "Media Downgrading",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-8.1",
"TITLE": "Media Downgrading | Documentation of Process",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-8.2",
"TITLE": "Media Downgrading | Equipment Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-8.3",
"TITLE": "Media Downgrading | Controlled Unclassified Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "mp-8.4",
"TITLE": "Media Downgrading | Classified Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-1",
"TITLE": "Physical and Environmental Protection Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pe-2",
"TITLE": "Physical Access Authorizations",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pe-2.1",
"TITLE": "Physical Access Authorizations | Access by Position / Role",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-2.2",
"TITLE": "Physical Access Authorizations | Two Forms of Identification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-2.3",
"TITLE": "Physical Access Authorizations | Restrict Unescorted Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-3",
"TITLE": "Physical Access Control",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pe-3.1",
"TITLE": "Physical Access Control | Information System Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "pe-3.2",
"TITLE": "Physical Access Control | Facility / Information System Boundaries",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-3.3",
"TITLE": "Physical Access Control | Continuous Guards / Alarms / Monitoring",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-3.4",
"TITLE": "Physical Access Control | Lockable Casings",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-3.5",
"TITLE": "Physical Access Control | Tamper Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-3.6",
"TITLE": "Physical Access Control | Facility Penetration Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-4",
"TITLE": "Access Control For Transmission Medium",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "pe-5",
"TITLE": "Access Control For Output Devices",
"Confidentiality": "Moderate",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-5.1",
"TITLE": "Access Control For Output Devices | Access to Output by Authorized Individuals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-5.2",
"TITLE": "Access Control For Output Devices | Access to Output by Individual Identity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-5.3",
"TITLE": "Access Control For Output Devices | Marking Output Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-6",
"TITLE": "Monitoring Physical Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pe-6.1",
"TITLE": "Monitoring Physical Access | Intrusion Alarms / Surveillance Equipment",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "pe-6.2",
"TITLE": "Monitoring Physical Access | Automated Intrusion Recognition / Responses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-6.3",
"TITLE": "Monitoring Physical Access | Video Surveillance",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-6.4",
"TITLE": "Monitoring Physical Access | Monitoring Physical Access to Information Systems",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "pe-7",
"TITLE": "Visitor Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-7.1",
"TITLE": "Visitor Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-7.2",
"TITLE": "Visitor Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-8",
"TITLE": "Visitor Access Records",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pe-8.1",
"TITLE": "Visitor Access Records | Automated Records Maintenance / Review",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "pe-8.2",
"TITLE": "Visitor Access Records | Physical Access Records",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-9",
"TITLE": "Power Equipment and Cabling",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "pe-9.1",
"TITLE": "Power Equipment and Cabling | Redundant Cabling",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-9.2",
"TITLE": "Power Equipment and Cabling | Automatic Voltage Controls",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-10",
"TITLE": "Emergency Shutoff",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "pe-10.1",
"TITLE": "Emergency Shutoff | Accidental / Unauthorized Activation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-11",
"TITLE": "Emergency Power",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "pe-11.1",
"TITLE": "Emergency Power | Long-Term Alternate Power Supply - Minimal Operational Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "pe-11.2",
"TITLE": "Emergency Power | Long-Term Alternate Power Supply - Self-Contained",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-12",
"TITLE": "Emergency Lighting",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "pe-12.1",
"TITLE": "Emergency Lighting | Essential Missions / Business Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-13",
"TITLE": "Fire Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "pe-13.1",
"TITLE": "Fire Protection | Detection Devices / Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "pe-13.2",
"TITLE": "Fire Protection | Suppression Devices / Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "pe-13.3",
"TITLE": "Fire Protection | Automatic Fire Suppression",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "pe-13.4",
"TITLE": "Fire Protection | Inspections",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "pe-14",
"TITLE": "Temperature and Humidity Controls",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "pe-14.1",
"TITLE": "Temperature and Humidity Controls | Automatic Controls",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-14.2",
"TITLE": "Temperature and Humidity Controls | Monitoring With Alarms / Notifications",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-15",
"TITLE": "Water Damage Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "pe-15.1",
"TITLE": "Water Damage Protection | Automation Support",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "pe-16",
"TITLE": "Delivery and Removal",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pe-17",
"TITLE": "Alternate Work Site",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "pe-18",
"TITLE": "Location of Information System Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "pe-18.1",
"TITLE": "Location of Information System Components | Facility Site",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-19",
"TITLE": "Information Leakage",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-19.1",
"TITLE": "Information Leakage | National Emissions / TEMPEST Policies and Procedures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pe-20",
"TITLE": "Asset Monitoring and Tracking",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-1",
"TITLE": "Security Planning Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pl-2",
"TITLE": "System Security Plan",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pl-2.1",
"TITLE": "System Security Plan | Concept of Operations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-2.2",
"TITLE": "System Security Plan | Functional Architecture",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-2.3",
"TITLE": "System Security Plan | Plan / Coordinate With Other Organizational Entities",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "pl-3",
"TITLE": "System Security Plan Update",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-4",
"TITLE": "Rules of Behavior",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pl-4.1",
"TITLE": "Rules of Behavior | Social Media and Networking Restrictions",
"Confidentiality": "Moderate",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-5",
"TITLE": "Privacy Impact Assessment",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-6",
"TITLE": "Security-Related Activity Planning",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-7",
"TITLE": "Security Concept of Operations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pl-8",
"TITLE": "Information Security Architecture",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pl-8.1",
"TITLE": "Information Security Architecture | Defense-in-Depth",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pl-8.2",
"TITLE": "Information Security Architecture | Supplier Diversity",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pl-9",
"TITLE": "Central Management",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-1",
"TITLE": "Personnel Security Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ps-2",
"TITLE": "Position Risk Designation",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ps-3",
"TITLE": "Personnel Screening",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ps-3.1",
"TITLE": "Personnel Screening | Classified Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-3.2",
"TITLE": "Personnel Screening | Formal Indoctrination",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-3.3",
"TITLE": "Personnel Screening | Information With Special Protection Measures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-4",
"TITLE": "Personnel Termination",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ps-4.1",
"TITLE": "Personnel Termination | Post-Employment Requirements",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-4.2",
"TITLE": "Personnel Termination | Automated Notification",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ps-5",
"TITLE": "Personnel Transfer",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ps-6",
"TITLE": "Access Agreements",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ps-6.1",
"TITLE": "Access Agreements | Information Requiring Special Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-6.2",
"TITLE": "Access Agreements | Classified Information Requiring Special Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-6.3",
"TITLE": "Access Agreements | Post-Employment Requirements",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ps-7",
"TITLE": "Third-Party Personnel Security",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "ps-8",
"TITLE": "Personnel Sanctions",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-1",
"TITLE": "Risk Assessment Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-2",
"TITLE": "Security Categorization",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-3",
"TITLE": "Risk Assessment",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-4",
"TITLE": "Risk Assessment Update",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ra-5",
"TITLE": "Vulnerability Scanning",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-5.1",
"TITLE": "Vulnerability Scanning | Update Tool Capability",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-5.2",
"TITLE": "Vulnerability Scanning | Update by Frequency / Prior to New Scan / When Identified",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-5.3",
"TITLE": "Vulnerability Scanning | Breadth /Depth of Coverage",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ra-5.4",
"TITLE": "Vulnerability Scanning | Discoverable Information",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-5.5",
"TITLE": "Vulnerability Scanning | Privileged Access",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ra-5.6",
"TITLE": "Vulnerability Scanning | Automated Trend Analyses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ra-5.7",
"TITLE": "Vulnerability Scanning | Automated Detection and Notification of Unauthorized Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ra-5.8",
"TITLE": "Vulnerability Scanning | Review Historic Audit Logs",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ra-5.9",
"TITLE": "Vulnerability Scanning | Penetration Testing and Analyses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ra-5.10",
"TITLE": "Vulnerability Scanning | Correlate Scanning Information",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "ra-6",
"TITLE": "Technical Surveillance Countermeasures Survey",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-1",
"TITLE": "System and Services Acquisition Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-2",
"TITLE": "Allocation of Resources",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-3",
"TITLE": "System Development Life Cycle",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-4",
"TITLE": "Acquisition Process",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-4.1",
"TITLE": "Acquisition Process | Functional Properties of Security Controls",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "sa-4.2",
"TITLE": "Acquisition Process | Design / Implementation Information for Security Controls",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "sa-4.3",
"TITLE": "Acquisition Process | Development Methods / Techniques / Practices",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "sa-4.4",
"TITLE": "Acquisition Process | Assignment of Components to Systems",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-4.5",
"TITLE": "Acquisition Process | System / Component / Service Configurations",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "sa-4.6",
"TITLE": "Acquisition Process | Use of Information Assurance Products",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-4.7",
"TITLE": "Acquisition Process | NIAP-Approved Protection Profiles",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sa-4.8",
"TITLE": "Acquisition Process | Continuous Monitoring Plan",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-4.9",
"TITLE": "Acquisition Process | Functions / Ports / Protocols / Services in Use",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-4.10",
"TITLE": "Acquisition Process | Use of Approved PIV Products",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sa-5",
"TITLE": "Information System Documentation",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-5.1",
"TITLE": "Information System Documentation | Functional Properties of Security Controls",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-5.2",
"TITLE": "Information System Documentation | Security-Relevant External System Interfaces",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-5.3",
"TITLE": "Information System Documentation | High-Level Design",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-5.4",
"TITLE": "Information System Documentation | Low-Level Design",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-5.5",
"TITLE": "Information System Documentation | Source Code",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-6",
"TITLE": "Software Usage Restrictions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-6.1",
"TITLE": "Software Usage Restrictions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-7",
"TITLE": "User-Installed Software",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-8",
"TITLE": "Security Engineering Principles",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-9",
"TITLE": "External Information System Services",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-9.1",
"TITLE": "External Information Systems | Risk Assessments / Organizational Approvals",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sa-9.2",
"TITLE": "External Information Systems | Identification of Functions / Ports / Protocols / Services",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-9.3",
"TITLE": "External Information Systems | Establish / Maintain Trust Relationship with Providers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-9.4",
"TITLE": "External Information Systems | Consistent Interests of Consumers and Providers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-9.5",
"TITLE": "External Information Systems | Processing, Storage, and Service Location",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-10",
"TITLE": "Developer Configuration Management",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sa-10.1",
"TITLE": "Developer Configuration Management | Software / Firmware Integrity Verification",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sa-10.2",
"TITLE": "Developer Configuration Management | Alternative Configuration Management Processes",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-10.3",
"TITLE": "Developer Configuration Management | Hardware Integrity Verification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-10.4",
"TITLE": "Developer Configuration Management | Trusted Generation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-10.5",
"TITLE": "Developer Configuration Management | Mapping Integrity for Version Control",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-10.6",
"TITLE": "Developer Configuration Management | Trusted Distribution",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11",
"TITLE": "Developer Security Testing and Evaluation",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "sa-11.1",
"TITLE": "Developer Security Testing and Evaluation | Static Code Analysis",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.2",
"TITLE": "Developer Security Testing and Evaluation | Threat and Vulnerability Analyses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.3",
"TITLE": "Developer Security Testing and Evaluation | Independent Verification of Assessment Plans / Evidence",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.4",
"TITLE": "Developer Security Testing and Evaluation | Manual Code Reviews",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.5",
"TITLE": "Developer Security Testing and Evaluation | Penetration Testing / Analysis",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.6",
"TITLE": "Developer Security Testing and Evaluation | Attack Surface Reviews",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.7",
"TITLE": "Developer Security Testing and Evaluation | Verify Scope of Testing / Evaluation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-11.8",
"TITLE": "Developer Security Testing and Evaluation | Dynamic Code Analysis",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12",
"TITLE": "Supply Chain Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-12.1",
"TITLE": "Supply Chain Protection | Acquisition Strategies / Tools / Methods",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-12.2",
"TITLE": "Supply Chain Protection | Supplier Reviews",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.3",
"TITLE": "Supply Chain Protection | Trusted Shipping and Warehousing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.4",
"TITLE": "Supply Chain Protection | Diversity of Suppliers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.5",
"TITLE": "Supply Chain Protection | Limitation of Harm",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-12.6",
"TITLE": "Supply Chain Protection | Minimizing Procurement Time",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.7",
"TITLE": "Supply Chain Protection | Assessments Prior to Selection / Acceptance / Update",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.8",
"TITLE": "Supply Chain Protection | Use of All-Source Intelligence",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-12.9",
"TITLE": "Supply Chain Protection | Operations Security",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-12.10",
"TITLE": "Supply Chain Protection | Validate As Genuine and Not Altered",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.11",
"TITLE": "Supply Chain Protection | Penetration Testing / Analysis of Elements, Processes, and Actors",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-12.12",
"TITLE": "Supply Chain Protection | Inter-Organizational Agreements",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.13",
"TITLE": "Supply Chain Protection | Critical Information System Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.14",
"TITLE": "Supply Chain Protection | Identity and Traceability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-12.15",
"TITLE": "Supply Chain Protection | Processes to Address Weaknesses or Deficiencies",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-13",
"TITLE": "Trustworthiness",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-14",
"TITLE": "Criticality Analysis",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-14.1",
"TITLE": "Criticality Analysis / Critical Components with No Viable Alternative Sourcing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15",
"TITLE": "Development Process, Standards, and Tools",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sa-15.1",
"TITLE": "Development Process, Standards, and Tools | Quality Metrics",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.2",
"TITLE": "Development Process, Standards, and Tools | Security Tracking Tools",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.3",
"TITLE": "Development Process, Standards, and Tools | Criticality Analysis",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-15.4",
"TITLE": "Development Process, Standards, and Tools | Threat Modeling / Vulnerability Analysis",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-15.5",
"TITLE": "Development Process, Standards, and Tools | Attack Surface Reduction",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.6",
"TITLE": "Development Process, Standards, and Tools | Continuous Improvement",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.7",
"TITLE": "Development Process, Standards, and Tools | Automated Vulnerability Analysis",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "sa-15.8",
"TITLE": "Development Process, Standards, and Tools | Reuse of Threat / Vulnerability Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.9",
"TITLE": "Development Process, Standards, and Tools | Use of Live Data",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.10",
"TITLE": "Development Process, Standards, and Tools | Incident Response Plan",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-15.11",
"TITLE": "Development Process, Standards, and Tools | Archive Information System / Component",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-16",
"TITLE": "Developer-Provided Training",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-17",
"TITLE": "Developer Security Architecture and Design",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-17.1",
"TITLE": "Developer Security Architecture and Design | Formal Policy Model",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-17.2",
"TITLE": "Developer Security Architecture and Design | Security-Relevant Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-17.3",
"TITLE": "Developer Security Architecture and Design | Formal Correspondence",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-17.4",
"TITLE": "Developer Security Architecture and Design | Informal Correspondence",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-17.5",
"TITLE": "Developer Security Architecture and Design | Conceptually Simple Design",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-17.6",
"TITLE": "Developer Security Architecture and Design | Structure for Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-17.7",
"TITLE": "Developer Security Architecture and Design | Structure for Least Privilege",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-18",
"TITLE": "Tamper Resistance and Detection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-18.1",
"TITLE": "Tamper Resistance and Detection | Multiple Phases of SDLC",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-18.2",
"TITLE": "Tamper Resistance and Detection | Inspection of Information Systems, Components, or Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-19",
"TITLE": "Component Authenticity",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sa-19.1",
"TITLE": "Component Authenticity | Anti-Counterfeit Training",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-19.2",
"TITLE": "Component Authenticity | Configuration Control for Component Service / Repair",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-19.3",
"TITLE": "Component Authenticity | Component Disposal",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-19.4",
"TITLE": "Component Authenticity | Anti-Counterfeit Scanning",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-20",
"TITLE": "Customized Development of Critical Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-21",
"TITLE": "Developer Screening",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-21.1",
"TITLE": "Developer Screening | Validation of Screening",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sa-22",
"TITLE": "Unsupported System Components",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sa-22.1",
"TITLE": "Unsupported System Components | Alternative Sources for Continued Support",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-1",
"TITLE": "System and Communications Protection Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sc-2",
"TITLE": "Application Partitioning",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "sc-2.1",
"TITLE": "Application Partitioning | Interfaces For Non-Privileged Users",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-3",
"TITLE": "Security Function Isolation",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "sc-3.1",
"TITLE": "Security Function Isolation | Hardware Separation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-3.2",
"TITLE": "Security Function Isolation | Access / Flow Control Functions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-3.3",
"TITLE": "Security Function Isolation | Minimize Nonsecurity Functionality",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-3.4",
"TITLE": "Security Function Isolation | Module Coupling and Cohesiveness",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-3.5",
"TITLE": "Security Function Isolation | Layered Structures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-4",
"TITLE": "Information In Shared Resources",
"Confidentiality": "Moderate",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-4.1",
"TITLE": "Information In Shared Resources | Security Levels",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-4.2",
"TITLE": "Information In Shared Resources | Periods Processing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-5",
"TITLE": "Denial of Service Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "sc-5.1",
"TITLE": "Denial of Service Protection | Restrict Internal Users",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Low"
},
{
"ID": "sc-5.2",
"TITLE": "Denial of Service Protection | Excess Capacity / Bandwidth / Redundancy",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "sc-5.3",
"TITLE": "Denial of Service Protection | Detection / Monitoring",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "Moderate"
},
{
"ID": "sc-6",
"TITLE": "Resource Availability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7",
"TITLE": "Boundary Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.1",
"TITLE": "Boundary Protection | Physically Separated Subnetworks",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.2",
"TITLE": "Boundary Protection | Public Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.3",
"TITLE": "Boundary Protection | Access Points",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.4",
"TITLE": "Boundary Protection | External Telecommunications Services",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.5",
"TITLE": "Boundary Protection | Deny by Default / Allow by Exception",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.6",
"TITLE": "Boundary Protection | Response to Recognized Failures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.7",
"TITLE": "Boundary Protection | Prevent Split Tunneling for Remote Devices",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.8",
"TITLE": "Boundary Protection | Route Traffic to Authenticated Proxy Servers",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.9",
"TITLE": "Boundary Protection | Restrict Threatening Outgoing Communications Traffic",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.10",
"TITLE": "Boundary Protection | Prevent Unauthorized Exfiltration",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.11",
"TITLE": "Boundary Protection | Restrict Incoming Communications Traffic",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.12",
"TITLE": "Boundary Protection | Host-Based Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sc-7.13",
"TITLE": "Boundary Protection | Isolation of Security Tools / Mechanisms / Support Components",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.14",
"TITLE": "Boundary Protection | Protect Against Unauthorized Physical Connections",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-7.15",
"TITLE": "Boundary Protection | Route Privileged Network Accesses",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.16",
"TITLE": "Boundary Protection | Prevent Discovery of Components / Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.17",
"TITLE": "Boundary Protection | Automated Enforcement of Protocol Formats",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.18",
"TITLE": "Boundary Protection | Fail Secure",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "High"
},
{
"ID": "sc-7.19",
"TITLE": "Boundary Protection | Block Communication from Non-Organizationally Configured Hosts",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.20",
"TITLE": "Boundary Protection | Dynamic Isolation / Segregation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.21",
"TITLE": "Boundary Protection | Isolation of Information System Components",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "sc-7.22",
"TITLE": "Boundary Protection | Separate Subnets for Connecting to Different Security Domains",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-7.23",
"TITLE": "Boundary Protection | Disable Sender Feedback on Protocol Validation Failure",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-8",
"TITLE": "Transmission Confidentiality and Integrity",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-8.1",
"TITLE": "Transmission Confidentiality and Integrity | Cryptographic or Alternate Physical Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-8.2",
"TITLE": "Transmission Confidentiality and Integrity | Pre / Post Transmission Handling",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "sc-8.3",
"TITLE": "Transmission Confidentiality and Integrity | Cryptographic Protection for Message Externals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-8.4",
"TITLE": "Transmission Confidentiality and Integrity | Conceal / Randomize Communications",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-9",
"TITLE": "Transmission Confidentiality",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-9.1",
"TITLE": "Transmission Confidentiality | Cryptographic or Alternate Physical Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-9.2",
"TITLE": "Transmission Confidentiality | Pre / Post Transmission Handling",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-10",
"TITLE": "Network Disconnect",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "sc-11",
"TITLE": "Trusted Path",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-11.1",
"TITLE": "Trusted Path | Logical Isolation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-12",
"TITLE": "Cryptographic Key Establishment and Management",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-12.1",
"TITLE": "Cryptographic Key Establishment and Management | Availability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "High"
},
{
"ID": "sc-12.2",
"TITLE": "Cryptographic Key Establishment and Management | Symmetric Keys",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-12.3",
"TITLE": "Cryptographic Key Establishment and Management | Asymmetric Keys",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-12.4",
"TITLE": "Cryptographic Key Establishment and Management | PKI Certificates",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-12.5",
"TITLE": "Cryptographic Key Establishment and Management | PKI Certificates / Hardware Tokens",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-13",
"TITLE": "Cryptographic Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-13.1",
"TITLE": "Cryptographic Protection | FIPS-Validated Cryptography",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-13.2",
"TITLE": "Cryptographic Protection | NSA-Approved Cryptography",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-13.3",
"TITLE": "Cryptographic Protection | Individuals Without Formal Access Approvals",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-13.4",
"TITLE": "Cryptographic Protection | Digital Signatures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-14",
"TITLE": "Public Access Protections",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-15",
"TITLE": "Collaborative Computing Devices",
"Confidentiality": "Low",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-15.1",
"TITLE": "Collaborative Computing Devices | Physical Disconnect",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-15.2",
"TITLE": "Collaborative Computing Devices | Blocking Inbound / Outbound Communications Traffic",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-15.3",
"TITLE": "Collaborative Computing Devices | Disabling / Removal In Secure Work Areas",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-15.4",
"TITLE": "Collaborative Computing Devices | Explicitly Indicate Current Participants",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-16",
"TITLE": "Transmission of Security Attributes",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-16.1",
"TITLE": "Transmission of Security Attributes | Integrity Validation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-17",
"TITLE": "Public Key Infrastructure Certificates",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-18",
"TITLE": "Mobile Code",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-18.1",
"TITLE": "Mobile Code | Identify Unacceptable Code / Take Corrective Actions",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-18.2",
"TITLE": "Mobile Code | Acquisition / Development / Use",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-18.3",
"TITLE": "Mobile Code | Prevent Downloading / Execution",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-18.4",
"TITLE": "Mobile Code | Prevent Automatic Execution",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-18.5",
"TITLE": "Mobile Code | Allow Execution Only In Confined Environments",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-19",
"TITLE": "Voice Over Internet Protocol",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sc-20",
"TITLE": "Secure Name / Address Resolution Service (Authoritative Source)",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-20.1",
"TITLE": "Secure Name / Address Resolution Service (Authoritative Source) | Child Subspaces",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-20.2",
"TITLE": "Secure Name / Address Resolution Service (Authoritative Source) | Data Origin / Integrity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-21",
"TITLE": "Secure Name / Address Resolution Service (Recursive or Caching Resolver)",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-21.1",
"TITLE": "Secure Name / Address Resolution Service (Recursive or Caching Resolver) | Data Origin / Integrity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-22",
"TITLE": "Architecture and Provisioning for Name / Address Resolution Service",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sc-23",
"TITLE": "Session Authenticity",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-23.1",
"TITLE": "Session Authenticity | Invalidate Session Identifiers At Logout",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-23.2",
"TITLE": "Session Authenticity | User-Initiated Logouts / Message Displays",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-23.3",
"TITLE": "Session Authenticity | Unique Session Identifiers With Randomization",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-23.4",
"TITLE": "Session Authenticity | Unique Session Identifiers With Randomization",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-23.5",
"TITLE": "Session Authenticity | Allowed Certificate Authorities",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-24",
"TITLE": "Fail In Known State",
"Confidentiality": "High",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "sc-25",
"TITLE": "Thin Nodes",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-26",
"TITLE": "Honeypots",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-26.1",
"TITLE": "Honeypots | Detection of Malicious Code",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-27",
"TITLE": "Platform-Independent Applications",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-28",
"TITLE": "Protection of Information At Rest",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-28.1",
"TITLE": "Protection of Information At Rest | Cryptographic Protection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-28.2",
"TITLE": "Protection of Information At Rest | Off-Line Storage",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-29",
"TITLE": "Heterogeneity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-29.1",
"TITLE": "Heterogeneity | Virtualization Techniques",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-30",
"TITLE": "Concealment and Misdirection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-30.1",
"TITLE": "Concealment and Misdirection | Virtualization Techniques",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-30.2",
"TITLE": "Concealment and Misdirection | Randomness",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-30.3",
"TITLE": "Concealment and Misdirection | Change Processing / Storage Locations",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-30.4",
"TITLE": "Concealment and Misdirection | Misleading Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-30.5",
"TITLE": "Concealment and Misdirection | Concealment of System Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-31",
"TITLE": "Covert Channel Analysis",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-31.1",
"TITLE": "Covert Channel Analysis | Test Covert Channels for Exploitability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-31.2",
"TITLE": "Covert Channel Analysis | Maximum Bandwidth",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-31.3",
"TITLE": "Covert Channel Analysis | Measure Bandwidth In Operational Environments",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-32",
"TITLE": "Information System Partitioning",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-33",
"TITLE": "Transmission Preparation Integrity",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-34",
"TITLE": "Non-modifiable executable programs",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-34.1",
"TITLE": "Non-Modifiable Executable Programs | No Writable Storage",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-34.2",
"TITLE": "Non-Modifiable Executable Programs | Integrity Protection / Read-Only Media",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-34.3",
"TITLE": "Non-Modifiable Executable Programs | Hardware-Based Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-35",
"TITLE": "Honeyclients",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-36",
"TITLE": "Distributed Processing and Storage",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-36.1",
"TITLE": "Distributed Processing and Storage | Polling Techniques",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-37",
"TITLE": "Out-of-Band Channels",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-37.1",
"TITLE": "Out-Of-Band Channels | Ensure Delivery / Transmission",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-38",
"TITLE": "Operations Security",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "sc-39",
"TITLE": "Process Isolation",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "sc-39.1",
"TITLE": "Process Isolation | Hardware Separation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-39.2",
"TITLE": "Process Isolation | Thread Isolation",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-40",
"TITLE": "Wireless Link Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-40.1",
"TITLE": "Wireless Link Protection | Electromagnetic Interference",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-40.2",
"TITLE": "Wireless Link Protection | Reduce Detection Potential",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-40.3",
"TITLE": "Wireless Link Protection | Imitative or Manipulative Communications Deception",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-40.4",
"TITLE": "Wireless Link Protection | Signal Parameter Identification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-41",
"TITLE": "Port and I/O Device Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-42",
"TITLE": "Sensor Capability and Data",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-42.1",
"TITLE": "Sensor Capability and Data | Reporting to Authorized Individuals or Roles",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-42.2",
"TITLE": "Sensor Capability and Data | Authorized Use",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-42.3",
"TITLE": "Sensor Capability and Data | Prohibit Use of Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-43",
"TITLE": "Usage Restrictions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "sc-44",
"TITLE": "Detonation Chambers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-1",
"TITLE": "System and Information Integrity Policy and Procedures",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-2",
"TITLE": "Flaw Remediation",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-2.1",
"TITLE": "Flaw Remediation | Central Management",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-2.2",
"TITLE": "Flaw Remediation | Automated Flaw Remediation Status",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-2.3",
"TITLE": "Flaw Remediation | Time to Remediate Flaws / Benchmarks for Corrective Actions",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-2.4",
"TITLE": "Flaw Remediation | Automated Patch Management Tools",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-2.5",
"TITLE": "Flaw Remediation | Automatic software / Firmware Updates",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-2.6",
"TITLE": "Flaw Remediation | Removal of Previous Versions of Software / Firmware",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-3",
"TITLE": "Malicious Code Protection",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-3.1",
"TITLE": "Malicious Code Protection | Central Management",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-3.2",
"TITLE": "Malicious Code Protection | Automatic Updates",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-3.3",
"TITLE": "Malicious Code Protection | Non-Privileged Users",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.4",
"TITLE": "Malicious Code Protection | Updates Only by Privileged Users",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.5",
"TITLE": "Malicious Code Protection | Portable Storage Devices",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.6",
"TITLE": "Malicious Code Protection | Testing / Verification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.7",
"TITLE": "Malicious Code Protection | Non Signature-Based Detection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.8",
"TITLE": "Malicious Code Protection | Detect Unauthorized Commands",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.9",
"TITLE": "Malicious Code Protection | Authenticate Remote commands",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-3.10",
"TITLE": "Malicious Code Protection | Malicious Code Analysis",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-4",
"TITLE": "Information System Monitoring",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.1",
"TITLE": "Information System Monitoring | System-Wide Intrusion Detection System",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.2",
"TITLE": "Information System Monitoring | Automated Tools For Real-Time Analysis",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "si-4.3",
"TITLE": "Information System Monitoring | Automated Tool Integration",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.4",
"TITLE": "Information System Monitoring | Inbound and Outbound Communications Traffic",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.5",
"TITLE": "Information System Monitoring | System-Generated Alerts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.6",
"TITLE": "Information System Monitoring | Restrict Non-Privileged Users",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.7",
"TITLE": "Information System Monitoring | Automated Response to Suspicious Events",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.8",
"TITLE": "Information System Monitoring | Protection of Monitoring Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.9",
"TITLE": "Information System Monitoring | Testing of Monitoring Tools",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.10",
"TITLE": "Information System Monitoring | Visibility of Encrypted Communications",
"Confidentiality": "Moderate",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "si-4.11",
"TITLE": "Information System Monitoring | Analyze Communications Traffic Anomalies",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.12",
"TITLE": "Information System Monitoring | Automated Alerts",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.13",
"TITLE": "Information System Monitoring | Analyze Traffic / Event Patterns",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.14",
"TITLE": "Information System Monitoring | Wireless Intrusion Detection",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.15",
"TITLE": "Information System Monitoring | Wireless to Wireline Communications",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.16",
"TITLE": "Information System Monitoring | Correlate Monitoring Information",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.17",
"TITLE": "Information System Monitoring | Integrated Situational Awareness",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.18",
"TITLE": "Information System Monitoring | Analyze Traffic / Covert Exfiltration",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.19",
"TITLE": "Information System Monitoring | Individuals Posing Greater Risk",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.20",
"TITLE": "Information System Monitoring | Privileged User",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.21",
"TITLE": "Information System Monitoring | Probationary Periods",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-4.22",
"TITLE": "Information System Monitoring | Unauthorized Network Services",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.23",
"TITLE": "Information System Monitoring | Host-Based Devices",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "si-4.24",
"TITLE": "Information System Monitoring | Indicators of Compromise",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-5",
"TITLE": "Security Alerts, Advisories, and Directives",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-5.1",
"TITLE": "Security Alerts, Advisories, and Directives | Automated Alerts and Advisories",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "si-6",
"TITLE": "Security Function Verification",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "si-6.1",
"TITLE": "Security Function Verification | Notification of Failed Security Tests",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-6.2",
"TITLE": "Security Function Verification | Automation Support For Distributed Testing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-6.3",
"TITLE": "Security Function Verification | Report Verification Results",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "si-7",
"TITLE": "Software, Firmware, and Information Integrity",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "si-7.1",
"TITLE": "Software, Firmware, and Information Integrity | Integrity Checks",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "si-7.2",
"TITLE": "Software, Firmware, and Information Integrity | Automated Notifications of Integrity Violations",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "si-7.3",
"TITLE": "Software, Firmware, and Information Integrity | Centrally-Managed Integrity Tools",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.4",
"TITLE": "Software, Firmware, and Information Integrity | Tamper-Evident Packaging",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.5",
"TITLE": "Software, Firmware, and Information Integrity | Automated Response to Integrity Violations",
"Confidentiality": "NA",
"Integrity": "High",
"Availability": "NA"
},
{
"ID": "si-7.6",
"TITLE": "Software, Firmware, and Information Integrity | Cryptographic Protection",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.7",
"TITLE": "Software, Firmware, and Information Integrity | Integration of Detection and Response",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "si-7.8",
"TITLE": "Software, Firmware, and Information Integrity | Auditing Capability For Significant Events",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "si-7.9",
"TITLE": "Software, Firmware, and Information Integrity | Verify Boot Process",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.10",
"TITLE": "Software, Firmware, and Information Integrity | Protection of Boot Firmware",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.11",
"TITLE": "Software, Firmware, and Information Integrity | Confined Environments With Limited Privileges",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.12",
"TITLE": "Software, Firmware, and Information Integrity | Integrity Verification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.13",
"TITLE": "Software, Firmware, and Information Integrity | Code Execution In Protected Environments",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.14",
"TITLE": "Software, Firmware, and Information Integrity | Binary or Machine Executable Code",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-7.15",
"TITLE": "Software, Firmware, and Information Integrity | Code Authentication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-7.16",
"TITLE": "Software, Firmware, and Information Integrity | Time Limit on Process Execution without Supervision",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-8",
"TITLE": "Spam Protection",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "si-8.1",
"TITLE": "Spam Protection | Central Management of Protection Mechanisms",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "si-8.2",
"TITLE": "Spam Protection | Automatic Updates",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "Moderate"
},
{
"ID": "si-8.3",
"TITLE": "Spam Protection | Continuous Learning Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-9",
"TITLE": "Information Input Restrictions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-10",
"TITLE": "Information Input Validation",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-10.1",
"TITLE": "Information Input Validation | Manual Override Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-10.2",
"TITLE": "Information Input Validation | Review / Resolution of Errors",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-10.3",
"TITLE": "Information Input Validation | Predictable Behavior",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "si-10.4",
"TITLE": "Information Input Validation | Review / Timing Interactions",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-10.5",
"TITLE": "Information Input Validation | Review / Restrict Inputs to Trusted Sources and Approved Formats",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-11",
"TITLE": "Error Handling",
"Confidentiality": "NA",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-12",
"TITLE": "Information Handling and Retention",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "NA"
},
{
"ID": "si-13",
"TITLE": "Predictable Failure Prevention",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-13.1",
"TITLE": "Predictable Failure Prevention | Transferring Component Responsibilities",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-13.2",
"TITLE": "Predictable Failure Prevention | Time Limit on Process Execution without Supervision",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-13.3",
"TITLE": "Predictable Failure Prevention | Manual Transfer between Components",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-13.4",
"TITLE": "Predictable Failure Prevention | Standby Component Installation / Notification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-13.5",
"TITLE": "Predictable Failure Prevention | Failover Capability",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-14",
"TITLE": "Non-Persistence",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-14.1",
"TITLE": "Non-Persistence | Refresh from Trusted Sources",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-15",
"TITLE": "Information Output Filtering",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "si-16",
"TITLE": "Memory Protection",
"Confidentiality": "NA",
"Integrity": "Moderate",
"Availability": "NA"
},
{
"ID": "si-17",
"TITLE": "Fail-Safe Procedures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "pm-1",
"TITLE": "Information Security Program Plan",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-2",
"TITLE": "Senior Information Security Officer",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-3",
"TITLE": "Information Security Resources",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-4",
"TITLE": "Plan of Action and Milestones Process",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-5",
"TITLE": "Information System Inventory",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-6",
"TITLE": "Information Security Measures of Performance",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-7",
"TITLE": "Enterprise Architecture",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-8",
"TITLE": "Critical Infrastructure Plan",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-9",
"TITLE": "Risk Management Strategy",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-10",
"TITLE": "Security Authorization Process",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-11",
"TITLE": "Mission/Business Process Definition",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-12",
"TITLE": "Insider Threat Program",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-13",
"TITLE": "Information Security Workforce",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-14",
"TITLE": "Testing, Training, and Monitoring",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-15",
"TITLE": "Contacts with Security Groups and Associations",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "pm-16",
"TITLE": "Threat Awareness Program",
"Confidentiality": "Low",
"Integrity": "Low",
"Availability": "Low"
},
{
"ID": "ap-1",
"TITLE": "Authority to Collect",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ap-2",
"TITLE": "Purpose Specification",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-1",
"TITLE": "Governance and Privacy Program",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-2",
"TITLE": "Privacy Impact and Risk Assessment",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-3",
"TITLE": "Privacy Requirements for Contractors and Service Providers",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-4",
"TITLE": "Privacy Monitoring and Auditing",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-5",
"TITLE": "Privacy Awareness and Training",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-6",
"TITLE": "Privacy Reporting",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-7",
"TITLE": "Privacy-Enhanced System Design and Development",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ar-8",
"TITLE": "Accounting of Disclosures",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "di-1",
"TITLE": "Data Quality",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "di-1.1",
"TITLE": "Data Quality | Validate PII",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "di-1.2",
"TITLE": "Data Quality | Re-Validate PII",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "di-2",
"TITLE": "Data Integrity and Data Integrity Board",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "di-2.1",
"TITLE": "Data Integrity and Data Integrity Board | Publish Agreements on Website",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "dm-1",
"TITLE": "Minimization of Personally Identifiable Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "dm-1.1",
"TITLE": "Minimization of Personally Identifiable Information | Locate / Remove / Redact / Anonymize PII",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "dm-2",
"TITLE": "Data Retention and Disposal",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "dm-2.1",
"TITLE": "Data Retention and Disposal | System Configuration",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "dm-3",
"TITLE": "Minimization of PII Used in Testing, Training, and Research",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "dm-3.1",
"TITLE": "Minimization of PII Used in Testing, Training, and Research | Risk Minimization Techniques",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ip-1",
"TITLE": "Consent",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ip-1.1",
"TITLE": "Consent | Mechanisms Supporting Itemized or Tiered Consent",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ip-2",
"TITLE": "Individual Access",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ip-3",
"TITLE": "Redress",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ip-4",
"TITLE": "Complaint Management",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ip-4.1",
"TITLE": "Complaint Management | Response Times",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "se-1",
"TITLE": "Inventory of Personally Identifiable Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "se-2",
"TITLE": "Privacy Incident Response",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "tr-1",
"TITLE": "Privacy Notice",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "tr-1.1",
"TITLE": "Privacy Notice | Real-Time or Layered Notice",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "tr-2",
"TITLE": "System of Records Notices and Privacy Act Statements",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "tr-2.1",
"TITLE": "System of Records Notices and Privacy Act Statements | Public Website Publication",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "tr-3",
"TITLE": "Dissemination of Privacy Program Information",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ul-1",
"TITLE": "Internal Use",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
},
{
"ID": "ul-2",
"TITLE": "Information Sharing with Third Parties",
"Confidentiality": "NA",
"Integrity": "NA",
"Availability": "NA"
}
]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment