manage.get.gov/docs/compliance/dist/system-security-plans/ato/cm-4.2.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

1.7 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

cm-4.2 - [catalog] Verification of Controls

Control Statement

After system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.

Control guidance

Implementation in this context refers to installing changed code in the operational system that may have an impact on security or privacy controls.

Control assessment-objective

the impacted controls are implemented correctly with regard to meeting the security requirements for the system after system changes; the impacted controls are implemented correctly with regard to meeting the privacy requirements for the system after system changes; the impacted controls are operating as intended with regard to meeting the security requirements for the system after system changes; the impacted controls are operating as intended with regard to meeting the privacy requirements for the system after system changes; the impacted controls are producing the desired outcome with regard to meeting the security requirements for the system after system changes; the impacted controls are producing the desired outcome with regard to meeting the privacy requirements for the system after system changes.


What is the solution and how is it implemented?

Add control implementation description here for control cm-4.2