2.4 KiB
implementation-status | control-origination | |||||
---|---|---|---|---|---|---|
|
|
ac-21 - [catalog] Information Sharing
Control Statement
-
[a] Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for information-sharing circumstances ; and
-
[b] Employ automated mechanisms to assist users in making information sharing and collaboration decisions.
Control guidance
Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive information, classified information related to special access programs or compartments, privileged information, proprietary information, and personally identifiable information. Security and privacy risk assessments as well as applicable laws, regulations, and policies can provide useful inputs to these determinations. Depending on the circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program or compartment. Access restrictions may include non-disclosure agreements (NDA). Information flow techniques and security attributes may be used to provide automated assistance to users making sharing and collaboration decisions.
Control assessment-objective
authorized users are enabled to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for information-sharing circumstances; automated mechanisms are employed to assist users in making information-sharing and collaboration decisions.
What is the solution and how is it implemented?
Implementation a.
Add control implementation description here for item ac-21_smt.a
Implementation b.
Add control implementation description here for item ac-21_smt.b