mirror of
https://github.com/cisagov/manage.get.gov.git
synced 2025-07-23 03:06:01 +02:00
Document things cloud.gov CRM fully supports (#122)
* document things cloud.gov crm fully supports * run make assemble
This commit is contained in:
parent
72e92c9b54
commit
8d493d2e44
53 changed files with 2129 additions and 942 deletions
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-17.1 - \[catalog\] Monitoring and Control
|
||||
|
@ -27,6 +24,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ac-17.1
|
||||
cloud.gov logs all remote access to applications and application instances, and makes those events available for audit.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-17.2 - \[catalog\] Protection of Confidentiality and Integrity Using Encryption
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ac-17.2
|
||||
All remote access to cloud.gov-hosted applications happens over TLS and access to application instances happens via SSH.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-17.3 - \[catalog\] Managed Access Control Points
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ac-17.3
|
||||
All remote access to cloud.gov-hosted applications passes through virtual AWS internet gateways, whose configuration is managed by the cloud.gov operations team. For information about customer network interconnections, see CA-3 (3).
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-18.1 - \[catalog\] Authentication and Encryption
|
||||
|
@ -27,6 +24,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ac-18.1
|
||||
Since cloud.gov is completely virtualized within AWS, there are no wireless capabilities possible.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-18 - \[catalog\] Wireless Access
|
||||
|
@ -37,12 +34,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item ac-18_smt.a
|
||||
Since cloud.gov is completely virtualized within AWS, there are no wireless capabilities possible.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item ac-18_smt.b
|
||||
Since cloud.gov is completely virtualized within AWS, there are no wireless capabilities possible.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-6.10 - \[catalog\] Prohibit Non-privileged Users from Executing Privileged Functions
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ac-6.10
|
||||
The cloud.gov role-based access control system prevents non-privileged users from executing privileged functions.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ac-6.9 - \[catalog\] Log Use of Privileged Functions
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ac-6.9
|
||||
cloud.gov automatically logs privileged actions taken within cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
---
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# cp-10.2 - \[catalog\] Transaction Recovery
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control cp-10.2
|
||||
In accordance with application owner SLAs established with cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# cp-10 - \[catalog\] System Recovery and Reconstitution
|
||||
|
@ -27,6 +24,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control cp-10
|
||||
In accordance with application owner SLAs established with cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# cp-8.1 - \[catalog\] Priority of Service Provisions
|
||||
|
@ -36,12 +33,10 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation (a)
|
||||
|
||||
Add control implementation description here for item cp-8.1_smt.a
|
||||
|
||||
cloud.gov leverages redundant telecommunications services from AWS GovCloud.
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (b)
|
||||
|
||||
Add control implementation description here for item cp-8.1_smt.b
|
||||
|
||||
cloud.gov leverages redundant telecommunications services from AWS GovCloud.
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# cp-8.2 - \[catalog\] Single Points of Failure
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control cp-8.2
|
||||
cloud.gov leverages redundant telecommunications services from AWS GovCloud.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# cp-8 - \[catalog\] Telecommunications Services
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control cp-8
|
||||
cloud.gov leverages redundant telecommunications services from AWS GovCloud.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-2 - \[catalog\] Controlled Maintenance
|
||||
|
@ -50,36 +47,36 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item ma-2_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item ma-2_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item ma-2_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation d.
|
||||
|
||||
Add control implementation description here for item ma-2_smt.d
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation e.
|
||||
|
||||
Add control implementation description here for item ma-2_smt.e
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation f.
|
||||
|
||||
Add control implementation description here for item ma-2_smt.f
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-3.1 - \[catalog\] Inspect Tools
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ma-3.1
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-3.2 - \[catalog\] Inspect Media
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ma-3.2
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-3.3 - \[catalog\] Prevent Unauthorized Removal
|
||||
|
@ -43,24 +40,24 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation (a)
|
||||
|
||||
Add control implementation description here for item ma-3.3_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (b)
|
||||
|
||||
Add control implementation description here for item ma-3.3_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (c)
|
||||
|
||||
Add control implementation description here for item ma-3.3_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (d)
|
||||
|
||||
Add control implementation description here for item ma-3.3_smt.d
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-3 - \[catalog\] Maintenance Tools
|
||||
|
@ -37,12 +34,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item ma-3_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item ma-3_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-4 - \[catalog\] Nonlocal Maintenance
|
||||
|
@ -47,30 +44,30 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item ma-4_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item ma-4_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item ma-4_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation d.
|
||||
|
||||
Add control implementation description here for item ma-4_smt.d
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation e.
|
||||
|
||||
Add control implementation description here for item ma-4_smt.e
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-5 - \[catalog\] Maintenance Personnel
|
||||
|
@ -39,18 +36,18 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item ma-5_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item ma-5_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item ma-5_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# ma-6 - \[catalog\] Timely Maintenance
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control ma-6
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# mp-2 - \[catalog\] Media Access
|
||||
|
@ -27,6 +24,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control mp-2
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# mp-3 - \[catalog\] Media Marking
|
||||
|
@ -35,12 +32,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item mp-3_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item mp-3_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# mp-4 - \[catalog\] Media Storage
|
||||
|
@ -38,12 +35,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item mp-4_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item mp-4_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# mp-5 - \[catalog\] Media Transport
|
||||
|
@ -43,24 +40,24 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item mp-5_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item mp-5_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item mp-5_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation d.
|
||||
|
||||
Add control implementation description here for item mp-5_smt.d
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# mp-6 - \[catalog\] Media Sanitization
|
||||
|
@ -37,12 +34,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item mp-6_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item mp-6_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# mp-7 - \[catalog\] Media Use
|
||||
|
@ -35,12 +32,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item mp-7_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item mp-7_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-1 - \[catalog\] Policy and Procedures
|
||||
|
@ -62,18 +59,18 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-1_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-1_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-1_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-10 - \[catalog\] Emergency Shutoff
|
||||
|
@ -38,18 +35,18 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-10_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-10_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-10_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-11 - \[catalog\] Emergency Power
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-11
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-12 - \[catalog\] Emergency Lighting
|
||||
|
@ -29,6 +26,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-12
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-13.1 - \[catalog\] Detection Systems — Automatic Activation and Notification
|
||||
|
@ -28,6 +25,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-13.1
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-13 - \[catalog\] Fire Protection
|
||||
|
@ -31,6 +28,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-13
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-14 - \[catalog\] Environmental Controls
|
||||
|
@ -35,12 +32,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-14_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-14_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -3,9 +3,6 @@ implementation-status:
|
|||
- c-not-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-15 - \[catalog\] Water Damage Protection
|
||||
|
@ -29,6 +26,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-15
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-16 - \[catalog\] Delivery and Removal
|
||||
|
@ -38,12 +35,12 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-16_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-16_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,9 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-17 - \[catalog\] Alternate Work Site
|
||||
|
@ -41,24 +39,24 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-17_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-17_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-17_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation d.
|
||||
|
||||
Add control implementation description here for item pe-17_smt.d
|
||||
CISA provides devices for communication between employees.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-2 - \[catalog\] Physical Access Authorizations
|
||||
|
@ -43,24 +40,24 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-2_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-2_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-2_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation d.
|
||||
|
||||
Add control implementation description here for item pe-2_smt.d
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-3 - \[catalog\] Physical Access Control
|
||||
|
@ -58,42 +55,42 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation d.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.d
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation e.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.e
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation f.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.f
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation g.
|
||||
|
||||
Add control implementation description here for item pe-3_smt.g
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-4 - \[catalog\] Access Control for Transmission
|
||||
|
@ -26,6 +23,5 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-4
|
||||
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-5 - \[catalog\] Access Control for Output Devices
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-5
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-6.1 - \[catalog\] Intrusion Alarms and Surveillance Equipment
|
||||
|
@ -27,6 +24,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-6.1
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-6 - \[catalog\] Monitoring Physical Access
|
||||
|
@ -40,18 +37,18 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-6_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-6_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-6_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-8 - \[catalog\] Visitor Access Records
|
||||
|
@ -38,18 +35,18 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation a.
|
||||
|
||||
Add control implementation description here for item pe-8_smt.a
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation b.
|
||||
|
||||
Add control implementation description here for item pe-8_smt.b
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation c.
|
||||
|
||||
Add control implementation description here for item pe-8_smt.c
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# pe-9 - \[catalog\] Power Equipment and Cabling
|
||||
|
@ -27,6 +24,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control pe-9
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# sc-21 - \[catalog\] Secure Name/Address Resolution Service (Recursive or Caching Resolver)
|
||||
|
@ -29,6 +26,5 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control sc-21
|
||||
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# sc-23 - \[catalog\] Session Authenticity
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control sc-23
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# sc-39 - \[catalog\] Process Isolation
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control sc-39
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# sc-7.3 - \[catalog\] Access Points
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control sc-7.3
|
||||
cloud.gov controls and limits the set of networks that can be used to reach the customer application.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-partially-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# sc-7.4 - \[catalog\] External Telecommunications Services
|
||||
|
@ -61,25 +58,25 @@ ______________________________________________________________________
|
|||
|
||||
## Implementation (b)
|
||||
|
||||
Add control implementation description here for item sc-7.4_smt.b
|
||||
cloud.gov is responsible for monitoring, security, and policy enforcement for the configuration of external interfaces.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (c)
|
||||
|
||||
Add control implementation description here for item sc-7.4_smt.c
|
||||
cloud.gov is responsible for monitoring, security, and policy enforcement for the configuration of external interfaces.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (d)
|
||||
|
||||
Add control implementation description here for item sc-7.4_smt.d
|
||||
cloud.gov is responsible for monitoring, security, and policy enforcement for the configuration of external interfaces.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
## Implementation (e)
|
||||
|
||||
Add control implementation description here for item sc-7.4_smt.e
|
||||
cloud.gov is responsible for monitoring, security, and policy enforcement for the configuration of external interfaces.
|
||||
|
||||
______________________________________________________________________
|
||||
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# sc-8.1 - \[catalog\] Cryptographic Protection
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control sc-8.1
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
|
@ -1,11 +1,8 @@
|
|||
---
|
||||
implementation-status:
|
||||
- c-not-implemented
|
||||
- c-implemented
|
||||
control-origination:
|
||||
- c-inherited-cloud-gov
|
||||
- c-inherited-cisa
|
||||
- c-common-control
|
||||
- c-system-specific-control
|
||||
---
|
||||
|
||||
# si-16 - \[catalog\] Memory Protection
|
||||
|
@ -26,6 +23,6 @@ ______________________________________________________________________
|
|||
|
||||
## What is the solution and how is it implemented?
|
||||
|
||||
Add control implementation description here for control si-16
|
||||
Customer applications fully inherit this control from cloud.gov.
|
||||
|
||||
______________________________________________________________________
|
||||
|
|
File diff suppressed because it is too large
Load diff
Loading…
Add table
Add a link
Reference in a new issue