Plans of Action & Milestones

new org - 0 POA&M item(s), 320 incomplete objective(s)

Incomplete Assessment Objectives

CMMC remediation should be driven by the failed or unassessed child objectives. A parent control cannot be closed until these objectives are MET.

Control Objective Status POA&M Eligibility Objective Description Evidence / Rationale
3.1.1 3.1.1[a] Not Yet Assessed Certification blocker authorized users are identified. -
3.1.1 3.1.1[b] Not Yet Assessed Certification blocker processes acting on behalf of authorized users are identified. -
3.1.1 3.1.1[c] Not Yet Assessed Certification blocker devices (including other systems) authorized to connect to the system are identified. -
3.1.1 3.1.1[d] Not Yet Assessed Certification blocker system access is limited to authorized users. -
3.1.1 3.1.1[e] Not Yet Assessed Certification blocker system access is limited to processes acting on behalf of authorized users. -
3.1.1 3.1.1[f] Not Yet Assessed Certification blocker system access is limited to authorized devices (including other systems). -
3.1.10 3.1.10[a] Not Yet Assessed Certification blocker the period of inactivity after which the system initiates a session lock is defined. -
3.1.10 3.1.10[b] Not Yet Assessed Certification blocker access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity. -
3.1.10 3.1.10[c] Not Yet Assessed Certification blocker previously visible information is concealed via a pattern-hiding display after the defined period of inactivity. -
3.1.11 3.1.11[a] Not Yet Assessed Certification blocker conditions requiring a user session to terminate are defined. -
3.1.11 3.1.11[b] Not Yet Assessed Certification blocker a user session is automatically terminated after any of the defined conditions occur. -
3.1.12 3.1.12[a] Not Yet Assessed Certification blocker remote access sessions are permitted. -
3.1.12 3.1.12[b] Not Yet Assessed Certification blocker the types of permitted remote access are identified. -
3.1.12 3.1.12[c] Not Yet Assessed Certification blocker remote access sessions are controlled. -
3.1.12 3.1.12[d] Not Yet Assessed Certification blocker remote access sessions are monitored. -
3.1.13 3.1.13[a] Not Yet Assessed Certification blocker cryptographic mechanisms to protect the confidentiality of remote access sessions are identified. -
3.1.13 3.1.13[b] Not Yet Assessed Certification blocker cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented. -
3.1.14 3.1.14[a] Not Yet Assessed Certification blocker managed access control points are identified and implemented. -
3.1.14 3.1.14[b] Not Yet Assessed Certification blocker remote access is routed through managed network access control points. -
3.1.15 3.1.15[a] Not Yet Assessed Certification blocker privileged commands authorized for remote execution are identified. -
3.1.15 3.1.15[b] Not Yet Assessed Certification blocker security-relevant information authorized to be accessed remotely is identified. -
3.1.15 3.1.15[c] Not Yet Assessed Certification blocker the execution of the identified privileged commands via remote access is authorized. -
3.1.15 3.1.15[d] Not Yet Assessed Certification blocker access to the identified security-relevant information via remote access is authorized. -
3.1.16 3.1.16[a] Not Yet Assessed Certification blocker wireless access points are identified. -
3.1.16 3.1.16[b] Not Yet Assessed Certification blocker wireless access is authorized prior to allowing such connections. -
3.1.17 3.1.17[a] Not Yet Assessed Certification blocker wireless access to the system is protected using encryption. -
3.1.17 3.1.17[b] Not Yet Assessed Certification blocker wireless access to the system is protected using authentication. -
3.1.18 3.1.18[a] Not Yet Assessed Certification blocker mobile devices that process, store, or transmit CUI are identified. -
3.1.18 3.1.18[b] Not Yet Assessed Certification blocker the connection of mobile devices is authorized. -
3.1.18 3.1.18[c] Not Yet Assessed Certification blocker mobile device connections are monitored and logged. -
3.1.19 3.1.19[a] Not Yet Assessed Certification blocker mobile devices and mobile computing platforms that process, store, or transmit CUI are identified. -
3.1.19 3.1.19[b] Not Yet Assessed Certification blocker encryption is employed to protect CUI on identified mobile devices and mobile computing platforms. -
3.1.2 3.1.2[a] Not Yet Assessed Certification blocker the types of transactions and functions that authorized users are permitted to execute are defined -
3.1.2 3.1.2[b] Not Yet Assessed Certification blocker system access is limited to the defined types of transactions and functions for authorized users. -
3.1.20 3.1.20[a] Not Yet Assessed Certification blocker connections to external systems are identified. -
3.1.20 3.1.20[b] Not Yet Assessed Certification blocker use of external systems is identified. -
3.1.20 3.1.20[c] Not Yet Assessed Certification blocker connections to external systems are verified. -
3.1.20 3.1.20[d] Not Yet Assessed Certification blocker use of external systems is verified. -
3.1.20 3.1.20[e] Not Yet Assessed Certification blocker connections to external systems are controlled/limited. -
3.1.20 3.1.20[f] Not Yet Assessed Certification blocker use of external systems is controlled/limited. -
3.1.21 3.1.21[a] Not Yet Assessed Certification blocker use of organizational portable storage devices containing CUI on external systems is identified and documented. -
3.1.21 3.1.21[b] Not Yet Assessed Certification blocker limits on the use of organizational portable storage devices containing CUI on external systems are defined. -
3.1.21 3.1.21[c] Not Yet Assessed Certification blocker use of organizational portable storage devices containing CUI on external systems is limited as defined. -
3.1.22 3.1.22[a] Not Yet Assessed Certification blocker individuals authorized to post or process information on publicly accessible systems are identified. -
3.1.22 3.1.22[b] Not Yet Assessed Certification blocker procedures to ensure CUI is not posted or processed on publicly accessible systems are identified. -
3.1.22 3.1.22[c] Not Yet Assessed Certification blocker a review process in in place prior to posting of any content to publicly accessible systems. -
3.1.22 3.1.22[d] Not Yet Assessed Certification blocker content on publicly accessible information systems is reviewed to ensure that it does not include CUI. -
3.1.22 3.1.22[e] Not Yet Assessed Certification blocker mechanisms are in place to remove and address improper posting of CUI. -
3.1.3 3.1.3[a] Not Yet Assessed Certification blocker information flow control policies are defined. -
3.1.3 3.1.3[b] Not Yet Assessed Certification blocker methods and enforcement mechanisms for controlling the flow of CUI are defined. -
3.1.3 3.1.3[c] Not Yet Assessed Certification blocker designated sources and destinations (e.g., networks, individuals, and devices) for CUI within systems and between interconnected systems are identified. -
3.1.3 3.1.3[d] Not Yet Assessed Certification blocker authorizations for controlling the flow of CUI are defined. -
3.1.3 3.1.3[e] Not Yet Assessed Certification blocker approved authorizations for controlling the flow of CUI are enforced. -
3.1.4 3.1.4[a] Not Yet Assessed Certification blocker the duties of individuals requiring separation to reduce the risk of malevolent activity are defined. -
3.1.4 3.1.4[b] Not Yet Assessed Certification blocker organization-defined duties of individuals requiring separation are separated. -
3.1.4 3.1.4[c] Not Yet Assessed Certification blocker separate accounts for individuals whose duties and accesses must be separated to reduce the risk of malevolent activity or collusion are established -
3.1.5 3.1.5[a] Not Yet Assessed Certification blocker privileged accounts are identified. -
3.1.5 3.1.5[b] Not Yet Assessed Certification blocker access to privileged accounts is authorized in accordance with the principle of least privilege. -
3.1.5 3.1.5[c] Not Yet Assessed Certification blocker security functions are identified. -
3.1.5 3.1.5[d] Not Yet Assessed Certification blocker access to security functions is authorized in accordance with the principle of least privilege. -
3.1.6 3.1.6[a] Not Yet Assessed Certification blocker nonsecurity functions are identified. -
3.1.6 3.1.6[b] Not Yet Assessed Certification blocker users are required to use non-privileged accounts or roles when accessing nonsecurity functions. -
3.1.7 3.1.7[a] Not Yet Assessed Certification blocker privileged functions are defined. -
3.1.7 3.1.7[b] Not Yet Assessed Certification blocker non-privileged users are defined. -
3.1.7 3.1.7[c] Not Yet Assessed Certification blocker non-privileged users are prevented from executing privileged functions. -
3.1.7 3.1.7[d] Not Yet Assessed Certification blocker the execution of privileged functions is captured in audit logs. -
3.1.8 3.1.8[a] Not Yet Assessed Certification blocker the means of limiting unsuccessful logon attempts is defined. -
3.1.8 3.1.8[b] Not Yet Assessed Certification blocker the defined means of limiting unsuccessful logon attempts is implemented. -
3.1.9 3.1.9[a] Not Yet Assessed Certification blocker privacy and security notices required by CUI-specified rules are identified, consistent, and associated with the specific CUI category -
3.1.9 3.1.9[b] Not Yet Assessed Certification blocker privacy and security notices are displayed. -
3.10.1 3.10.1[a] Not Yet Assessed Certification blocker authorized individuals allowed physical access are identified. -
3.10.1 3.10.1[b] Not Yet Assessed Certification blocker physical access to organizational systems is limited to authorized individuals. -
3.10.1 3.10.1[c] Not Yet Assessed Certification blocker physical access to equipment is limited to authorized individuals. -
3.10.1 3.10.1[d] Not Yet Assessed Certification blocker physical access to operating environments is limited to authorized individuals. -
3.10.2 3.10.2[a] Not Yet Assessed Certification blocker the physical facility where that system resides is protected. -
3.10.2 3.10.2[b] Not Yet Assessed Certification blocker the support infrastructure for that system is protected. -
3.10.2 3.10.2[c] Not Yet Assessed Certification blocker the physical facility where that system resides is monitored. -
3.10.2 3.10.2[d] Not Yet Assessed Certification blocker the support infrastructure for that system is monitored. -
3.10.3 3.10.3[a] Not Yet Assessed Certification blocker visitors are escorted. -
3.10.3 3.10.3[b] Not Yet Assessed Certification blocker visitor activity is monitored. -
3.10.4 3.10.4 Not Yet Assessed Certification blocker audit logs of physical access are maintained. -
3.10.5 3.10.5[a] Not Yet Assessed Certification blocker physical access devices are identified. -
3.10.5 3.10.5[b] Not Yet Assessed Certification blocker physical access devices are controlled. -
3.10.5 3.10.5[c] Not Yet Assessed Certification blocker physical access devices are managed. -
3.10.6 3.10.6[a] Not Yet Assessed Certification blocker safeguarding measures for CUI are defined for alternate work sites. -
3.10.6 3.10.6[b] Not Yet Assessed Certification blocker safeguarding measures for CUI are enforced for alternate work sites. -
3.11.1 3.11.1[a] Not Yet Assessed Certification blocker the frequency to assess risk to organizational operations, organizational assets, and individuals is defined. -
3.11.1 3.11.1[b] Not Yet Assessed Certification blocker risk to organizational operations, organizational assets, and individuals resulting from the operation of an organizational system that processes, stores, or transmits CUI is assessed with the defined frequency. -
3.11.2 3.11.2[a] Not Yet Assessed Certification blocker the frequency to scan for vulnerabilities in an organizational system and its applications that process, store, or transmit CUI is defined. -
3.11.2 3.11.2[b] Not Yet Assessed Certification blocker vulnerability scans are performed in an organizational system that processes, stores, or transmits CUI with the defined frequency. -
3.11.2 3.11.2[c] Not Yet Assessed Certification blocker vulnerability scans are performed in an application that contains CUI with the defined frequency. -
3.11.2 3.11.2[d] Not Yet Assessed Certification blocker vulnerability scans are performed in an organizational system that processes, stores, or transmits CUI when new vulnerabilities are identified. -
3.11.2 3.11.2[e] Not Yet Assessed Certification blocker vulnerability scans are performed in an application that contains CUI when new vulnerabilities are identified. -
3.11.3 3.11.3[a] Not Yet Assessed Certification blocker vulnerabilities are identified. -
3.11.3 3.11.3[b] Not Yet Assessed Certification blocker vulnerabilities are remediated in accordance with risk assessments. -
3.12.1 3.12.1[a] Not Yet Assessed Certification blocker the frequency of security control assessments is defined. -
3.12.1 3.12.1[b] Not Yet Assessed Certification blocker security controls are assessed with the defined frequency to determine if the controls are effective in their application. -
3.12.2 3.12.2[a] Not Yet Assessed Certification blocker deficiencies and vulnerabilities to be addressed by the plan of action are identified. -
3.12.2 3.12.2[b] Not Yet Assessed Certification blocker a plan of action is developed to correct identified deficiencies and reduce or eliminate identified vulnerabilities. -
3.12.2 3.12.2[c] Not Yet Assessed Certification blocker the plan of action is implemented to correct identified deficiencies and reduce or eliminate identified vulnerabilities. -
3.12.3 3.12.3 Not Yet Assessed Certification blocker security controls are monitored on an ongoing basis to ensure the continued effectiveness of those controls. -
3.12.4 3.12.4[a] Not Yet Assessed Certification blocker a system security plan is developed. -
3.12.4 3.12.4[b] Not Yet Assessed Certification blocker the system boundary is described and documented in the system security plan. -
3.12.4 3.12.4[c] Not Yet Assessed Certification blocker the system environment of operation is described and documented in the system security plan. -
3.12.4 3.12.4[d] Not Yet Assessed Certification blocker the security requirements identified and approved by the designated authority as non-applicable are identified. -
3.12.4 3.12.4[e] Not Yet Assessed Certification blocker the method of security requirement implementation is described and documented in the system security plan. -
3.12.4 3.12.4[f] Not Yet Assessed Certification blocker the relationship with or connection to other systems is described and documented in the system security plan. -
3.12.4 3.12.4[g] Not Yet Assessed Certification blocker the frequency to update the system security plan is defined. -
3.12.4 3.12.4[h] Not Yet Assessed Certification blocker system security plan is updated with the defined frequency. -
3.13.1 3.13.1[a] Not Yet Assessed Certification blocker the external system boundary is defined. -
3.13.1 3.13.1[b] Not Yet Assessed Certification blocker key internal system boundaries are defined. -
3.13.1 3.13.1[c] Not Yet Assessed Certification blocker communications are monitored at the external system boundary. -
3.13.1 3.13.1[d] Not Yet Assessed Certification blocker communications are monitored at key internal boundaries. -
3.13.1 3.13.1[e] Not Yet Assessed Certification blocker communications are controlled at the external system boundary. -
3.13.1 3.13.1[f] Not Yet Assessed Certification blocker communications are controlled at key internal boundaries. -
3.13.1 3.13.1[g] Not Yet Assessed Certification blocker communications are protected at the external system boundary. -
3.13.1 3.13.1[h] Not Yet Assessed Certification blocker communications are protected at key internal boundaries. -
3.13.10 3.13.10[a] Not Yet Assessed Certification blocker cryptographic keys are established whenever cryptography is employed. -
3.13.10 3.13.10[b] Not Yet Assessed Certification blocker cryptographic keys are managed whenever cryptography is employed. -
3.13.11 3.13.11 Not Yet Assessed Certification blocker FIPS-validated cryptography is employed to protect the confidentiality of CUI. -
3.13.12 3.13.12[a] Not Yet Assessed Certification blocker collaborative computing devices are identified. -
3.13.12 3.13.12[b] Not Yet Assessed Certification blocker collaborative computing devices provide indication to users of devices in use. -
3.13.12 3.13.12[c] Not Yet Assessed Certification blocker remote activation of collaborative computing devices is prohibited. -
3.13.13 3.13.13[a] Not Yet Assessed Certification blocker use of mobile code is controlled. -
3.13.13 3.13.13[b] Not Yet Assessed Certification blocker use of mobile code is monitored. -
3.13.14 3.13.14[a] Not Yet Assessed Certification blocker use of Voice over Internet Protocol (VoIP) technologies is controlled. -
3.13.14 3.13.14[b] Not Yet Assessed Certification blocker use of Voice over Internet Protocol (VoIP) technologies is monitored. -
3.13.15 3.13.15 Not Yet Assessed Certification blocker the authenticity of communications sessions is protected. -
3.13.16 3.13.16 Not Yet Assessed Certification blocker the confidentiality of CUI at rest is protected. -
3.13.2 3.13.2[a] Not Yet Assessed Certification blocker architectural designs that promote effective information security are identified. -
3.13.2 3.13.2[b] Not Yet Assessed Certification blocker software development techniques that promote effective information security are identified. -
3.13.2 3.13.2[c] Not Yet Assessed Certification blocker systems engineering principles that promote effective information security are identified. -
3.13.2 3.13.2[d] Not Yet Assessed Certification blocker identified architectural designs that promote effective information security are employed. -
3.13.2 3.13.2[e] Not Yet Assessed Certification blocker identified software development techniques that promote effective information security are employed. -
3.13.2 3.13.2[f] Not Yet Assessed Certification blocker identified systems engineering principles that promote effective information security are employed. -
3.13.3 3.13.3[a] Not Yet Assessed Certification blocker user functionality is identified. -
3.13.3 3.13.3[b] Not Yet Assessed Certification blocker system management functionality is identified. -
3.13.3 3.13.3[c] Not Yet Assessed Certification blocker user functionality is separated from system management functionality. -
3.13.4 3.13.4 Not Yet Assessed Certification blocker unauthorized and unintended information transfer via shared system resources is prevented. -
3.13.5 3.13.5[a] Not Yet Assessed Certification blocker publicly accessible system components are identified. -
3.13.5 3.13.5[b] Not Yet Assessed Certification blocker subnetworks for publicly accessible system components are physically or logically separated from internal networks. -
3.13.6 3.13.6[a] Not Yet Assessed Certification blocker network communications traffic is denied by default. -
3.13.6 3.13.6[b] Not Yet Assessed Certification blocker network communications traffic is allowed by exception. -
3.13.7 3.13.7 Not Yet Assessed Certification blocker remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling). -
3.13.8 3.13.8[a] Not Yet Assessed Certification blocker cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified. -
3.13.8 3.13.8[b] Not Yet Assessed Certification blocker alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified. -
3.13.8 3.13.8[c] Not Yet Assessed Certification blocker either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission. -
3.13.9 3.13.9[a] Not Yet Assessed Certification blocker a period of inactivity to terminate network connections associated with communications sessions is defined. -
3.13.9 3.13.9[b] Not Yet Assessed Certification blocker network connections associated with communications sessions are terminated at the end of the sessions. -
3.13.9 3.13.9[c] Not Yet Assessed Certification blocker network connections associated with communications sessions are terminated after the defined period of inactivity. -
3.14.1 3.14.1[a] Not Yet Assessed Certification blocker the time within which to identify system flaws is specified. -
3.14.1 3.14.1[b] Not Yet Assessed Certification blocker system flaws are identified within the specified time frame. -
3.14.1 3.14.1[c] Not Yet Assessed Certification blocker the time within which to report system flaws is specified. -
3.14.1 3.14.1[d] Not Yet Assessed Certification blocker system flaws are reported within the specified time frame. -
3.14.1 3.14.1[e] Not Yet Assessed Certification blocker the time within which to correct system flaws is specified. -
3.14.1 3.14.1[f] Not Yet Assessed Certification blocker system flaws are corrected within the specified time frame. -
3.14.2 3.14.2[a] Not Yet Assessed Certification blocker designated locations for malicious code protection are identified. -
3.14.2 3.14.2[b] Not Yet Assessed Certification blocker protection from malicious code at designated locations is provided. -
3.14.3 3.14.3[a] Not Yet Assessed Certification blocker response actions to system security alerts and advisories are identified. -
3.14.3 3.14.3[b] Not Yet Assessed Certification blocker system security alerts and advisories are monitored. -
3.14.3 3.14.3[c] Not Yet Assessed Certification blocker actions in response to system security alerts and advisories are taken. -
3.14.4 3.14.4 Not Yet Assessed Certification blocker malicious code protection mechanisms are updated when new releases are available. -
3.14.5 3.14.5[a] Not Yet Assessed Certification blocker the frequency for malicious code scans is defined. -
3.14.5 3.14.5[b] Not Yet Assessed Certification blocker malicious code scans are performed with the defined frequency. -
3.14.5 3.14.5[c] Not Yet Assessed Certification blocker real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed. -
3.14.6 3.14.6[a] Not Yet Assessed Certification blocker the system is monitored to detect attacks and indicators of potential attacks. -
3.14.6 3.14.6[b] Not Yet Assessed Certification blocker inbound communications traffic is monitored to detect attacks and indicators of potential attacks. -
3.14.6 3.14.6[c] Not Yet Assessed Certification blocker outbound communications traffic is monitored to detect attacks and indicators of potential attacks. -
3.14.7 3.14.7[a] Not Yet Assessed Certification blocker authorized use of the system is defined. -
3.14.7 3.14.7[b] Not Yet Assessed Certification blocker unauthorized use of the system is identified. -
3.2.1 3.2.1[a] Not Yet Assessed Certification blocker security risks associated with organizational activities involving CUI are identified. -
3.2.1 3.2.1[b] Not Yet Assessed Certification blocker policies, standards, and procedures related to the security of the system are identified. -
3.2.1 3.2.1[c] Not Yet Assessed Certification blocker managers, systems administrators, and users of the system are made aware of the security risks associated with their activities. -
3.2.1 3.2.1[d] Not Yet Assessed Certification blocker managers, systems administrators, and users of the system are made aware of the applicable policies, standards, and procedures related to the security of the system. -
3.2.2 3.2.2[a] Not Yet Assessed Certification blocker information security-related duties, roles, and responsibilities are defined. -
3.2.2 3.2.2[b] Not Yet Assessed Certification blocker information security-related duties, roles, and responsibilities are assigned to designated personnel. -
3.2.2 3.2.2[c] Not Yet Assessed Certification blocker personnel are adequately trained to carry out their assigned information security-related duties, roles, and responsibilities. -
3.2.3 3.2.3[a] Not Yet Assessed Certification blocker potential indicators associated with insider threats are identified. -
3.2.3 3.2.3[b] Not Yet Assessed Certification blocker security awareness training on recognizing and reporting potential indicators of insider threat is provided to managers and employees. -
3.3.1 3.3.1[a] Not Yet Assessed Certification blocker audit logs needed (i.e., event types to be logged) to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity are specified. -
3.3.1 3.3.1[b] Not Yet Assessed Certification blocker the content of audit records needed to support monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity is defined. -
3.3.1 3.3.1[c] Not Yet Assessed Certification blocker audit records are created (generated). -
3.3.1 3.3.1[d] Not Yet Assessed Certification blocker audit records, once created, contain the defined content. -
3.3.1 3.3.1[e] Not Yet Assessed Certification blocker retention requirements for audit records are defined. -
3.3.1 3.3.1[f] Not Yet Assessed Certification blocker audit records are retained as defined. -
3.3.2 3.3.2[a] Not Yet Assessed Certification blocker the content of the audit records needed to support the ability to uniquely trace users to their actions is defined. -
3.3.2 3.3.2[b] Not Yet Assessed Certification blocker audit records, once created, contain the defined content. -
3.3.3 3.3.3[a] Not Yet Assessed Certification blocker a process for determining when to review logged events is defined. -
3.3.3 3.3.3[b] Not Yet Assessed Certification blocker event types being logged are reviewed in accordance with the defined review process. -
3.3.3 3.3.3[c] Not Yet Assessed Certification blocker event types being logged are updated based on the review. -
3.3.4 3.3.4[a] Not Yet Assessed Certification blocker personnel or roles to be alerted in the event of an audit logging process failure are identified. -
3.3.4 3.3.4[b] Not Yet Assessed Certification blocker types of audit logging process failures for which alert will be generated are defined. -
3.3.4 3.3.4[c] Not Yet Assessed Certification blocker identified personnel or roles are alerted in the event of an audit logging process failure. -
3.3.5 3.3.5[a] Not Yet Assessed Certification blocker audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity are defined. -
3.3.5 3.3.5[b] Not Yet Assessed Certification blocker defined audit record review, analysis, and reporting processes are correlated. -
3.3.6 3.3.6[a] Not Yet Assessed Certification blocker an audit record reduction capability that supports on-demand analysis is provided. -
3.3.6 3.3.6[b] Not Yet Assessed Certification blocker a report generation capability that supports on-demand reporting is provided. -
3.3.7 3.3.7[a] Not Yet Assessed Certification blocker internal system clocks are used to generate time stamps for audit records. -
3.3.7 3.3.7[b] Not Yet Assessed Certification blocker an authoritative source with which to compare and synchronize internal system clocks is specified. -
3.3.7 3.3.7[c] Not Yet Assessed Certification blocker internal system clocks used to generate time stamps for audit records are compared to and synchronized with the specified authoritative time source. -
3.3.8 3.3.8[a] Not Yet Assessed Certification blocker audit information is protected from unauthorized access. -
3.3.8 3.3.8[b] Not Yet Assessed Certification blocker audit information is protected from unauthorized modification. -
3.3.8 3.3.8[c] Not Yet Assessed Certification blocker audit information is protected from unauthorized deletion. -
3.3.8 3.3.8[d] Not Yet Assessed Certification blocker audit logging tools are protected from unauthorized access. -
3.3.8 3.3.8[e] Not Yet Assessed Certification blocker audit logging tools are protected from unauthorized modification. -
3.3.8 3.3.8[f] Not Yet Assessed Certification blocker audit logging tools are protected from unauthorized deletion. -
3.3.9 3.3.9[a] Not Yet Assessed Certification blocker a subset of privileged users granted access to manage audit logging functionality is defined. -
3.3.9 3.3.9[b] Not Yet Assessed Certification blocker management of audit logging functionality is limited to the defined subset of privileged users. -
3.4.1 3.4.1[a] Not Yet Assessed Certification blocker a baseline configuration is established. -
3.4.1 3.4.1[b] Not Yet Assessed Certification blocker the baseline configuration includes hardware, software, firmware, and documentation. -
3.4.1 3.4.1[c] Not Yet Assessed Certification blocker the baseline configuration is maintained (reviewed and updated) throughout the system development life cycle. -
3.4.1 3.4.1[d] Not Yet Assessed Certification blocker a system inventory is established. -
3.4.1 3.4.1[e] Not Yet Assessed Certification blocker the system inventory includes hardware, software, firmware, and documentation. -
3.4.1 3.4.1[f] Not Yet Assessed Certification blocker the inventory is maintained (reviewed and updated) throughout the system development life cycle. -
3.4.2 3.4.2[a] Not Yet Assessed Certification blocker security configuration settings for information technology products employed in the system are established and included in the baseline configuration. -
3.4.2 3.4.2[b] Not Yet Assessed Certification blocker security configuration settings for information technology products employed in the system are enforced. -
3.4.3 3.4.3[a] Not Yet Assessed Certification blocker changes to the system are tracked. -
3.4.3 3.4.3[b] Not Yet Assessed Certification blocker changes to the system are reviewed. -
3.4.3 3.4.3[c] Not Yet Assessed Certification blocker changes to the system are approved or disapproved. -
3.4.3 3.4.3[d] Not Yet Assessed Certification blocker changes to the system are logged. -
3.4.4 3.4.4 Not Yet Assessed Certification blocker the security impact of changes to each organizational system is analyzed prior to implementation. -
3.4.5 3.4.5[a] Not Yet Assessed Certification blocker physical access restrictions associated with changes to the system are defined. -
3.4.5 3.4.5[b] Not Yet Assessed Certification blocker physical access restrictions associated with changes to the system are documented. -
3.4.5 3.4.5[c] Not Yet Assessed Certification blocker physical access restrictions associated with changes to the system are approved. -
3.4.5 3.4.5[d] Not Yet Assessed Certification blocker physical access restrictions associated with changes to the system are enforced. -
3.4.5 3.4.5[e] Not Yet Assessed Certification blocker logical access restrictions associated with changes to the system are defined. -
3.4.5 3.4.5[f] Not Yet Assessed Certification blocker logical access restrictions associated with changes to the system are documented. -
3.4.5 3.4.5[g] Not Yet Assessed Certification blocker logical access restrictions associated with changes to the system are approved. -
3.4.5 3.4.5[h] Not Yet Assessed Certification blocker logical access restrictions associated with changes to the system are enforced. -
3.4.6 3.4.6[a] Not Yet Assessed Certification blocker essential system capabilities are defined based on the principle of least functionality. -
3.4.6 3.4.6[b] Not Yet Assessed Certification blocker the system is configured to provide only the defined essential capabilities. -
3.4.7 3.4.7[a] Not Yet Assessed Certification blocker essential programs are defined. -
3.4.7 3.4.7[b] Not Yet Assessed Certification blocker the use of nonessential programs is defined. -
3.4.7 3.4.7[c] Not Yet Assessed Certification blocker the use of nonessential programs is restricted, disabled, or prevented as defined. -
3.4.7 3.4.7[d] Not Yet Assessed Certification blocker essential functions are defined. -
3.4.7 3.4.7[e] Not Yet Assessed Certification blocker the use of nonessential functions is defined. -
3.4.7 3.4.7[f] Not Yet Assessed Certification blocker the use of nonessential functions is restricted, disabled, or prevented as defined. -
3.4.7 3.4.7[g] Not Yet Assessed Certification blocker essential ports are defined. -
3.4.7 3.4.7[h] Not Yet Assessed Certification blocker the use of nonessential ports is defined. -
3.4.7 3.4.7[i] Not Yet Assessed Certification blocker the use of nonessential ports is restricted, disabled, or prevented as defined. -
3.4.7 3.4.7[j] Not Yet Assessed Certification blocker essential protocols are defined. -
3.4.7 3.4.7[k] Not Yet Assessed Certification blocker the use of nonessential protocols is defined. -
3.4.7 3.4.7[l] Not Yet Assessed Certification blocker the use of nonessential protocols is restricted, disabled, or prevented as defined. -
3.4.7 3.4.7[m] Not Yet Assessed Certification blocker essential services are defined. -
3.4.7 3.4.7[n] Not Yet Assessed Certification blocker the use of nonessential services is defined. -
3.4.7 3.4.7[o] Not Yet Assessed Certification blocker the use of nonessential services is restricted, disabled, or prevented as defined. -
3.4.8 3.4.8[a] Not Yet Assessed Certification blocker a policy specifying whether whitelisting or blacklisting is to be implemented is specified. -
3.4.8 3.4.8[b] Not Yet Assessed Certification blocker the software allowed to execute under whitelisting or denied use under blacklisting is specified. -
3.4.8 3.4.8[c] Not Yet Assessed Certification blocker whitelisting to allow the execution of authorized software or blacklisting to prevent the use of unauthorized software is implemented as specified. -
3.4.9 3.4.9[a] Not Yet Assessed Certification blocker a policy for controlling the installation of software by users is established. -
3.4.9 3.4.9[b] Not Yet Assessed Certification blocker installation of software by users is controlled based on the established policy. -
3.4.9 3.4.9[c] Not Yet Assessed Certification blocker installation of software by users is monitored. -
3.5.1 3.5.1[a] Not Yet Assessed Certification blocker system users are identified. -
3.5.1 3.5.1[b] Not Yet Assessed Certification blocker processes acting on behalf of users are identified. -
3.5.1 3.5.1[c] Not Yet Assessed Certification blocker devices accessing the system are identified. -
3.5.10 3.5.10[a] Not Yet Assessed Certification blocker passwords are cryptographically protected in storage. -
3.5.10 3.5.10[b] Not Yet Assessed Certification blocker passwords are cryptographically protected in transit. -
3.5.11 3.5.11 Not Yet Assessed Certification blocker authentication information is obscured during the authentication process. -
3.5.2 3.5.2[a] Not Yet Assessed Certification blocker the identity of each user is authenticated or verified as a prerequisite to system access. -
3.5.2 3.5.2[b] Not Yet Assessed Certification blocker the identity of each process acting on behalf of a user is authenticated or verified as a prerequisite to system access. -
3.5.2 3.5.2[c] Not Yet Assessed Certification blocker the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access. -
3.5.3 3.5.3[a] Not Yet Assessed Certification blocker privileged accounts are identified. -
3.5.3 3.5.3[b] Not Yet Assessed Certification blocker multifactor authentication is implemented for local access to privileged accounts. -
3.5.3 3.5.3[c] Not Yet Assessed Certification blocker multifactor authentication is implemented for network access to privileged accounts. -
3.5.3 3.5.3[d] Not Yet Assessed Certification blocker multifactor authentication is implemented for network access to non-privileged accounts. -
3.5.4 3.5.4 Not Yet Assessed Certification blocker replay-resistant authentication mechanisms are implemented for all network account access to privileged and non-privileged accounts. -
3.5.5 3.5.5[a] Not Yet Assessed Certification blocker a period within which identifiers cannot be reused is defined. -
3.5.5 3.5.5[b] Not Yet Assessed Certification blocker reuse of identifiers is prevented within the defined period. -
3.5.6 3.5.6[a] Not Yet Assessed Certification blocker a period of inactivity after which an identifier is disabled is defined. -
3.5.6 3.5.6[b] Not Yet Assessed Certification blocker identifiers are disabled after the defined period of inactivity. -
3.5.7 3.5.7[a] Not Yet Assessed Certification blocker password complexity requirements are defined. -
3.5.7 3.5.7[b] Not Yet Assessed Certification blocker password change of character requirements are defined. -
3.5.7 3.5.7[c] Not Yet Assessed Certification blocker minimum password complexity requirements as defined are enforced when new passwords are created. -
3.5.7 3.5.7[d] Not Yet Assessed Certification blocker minimum password change of character requirements as defined are enforced when new passwords are created. -
3.5.8 3.5.8[a] Not Yet Assessed Certification blocker the number of generations during which a password cannot be reused is specified. -
3.5.8 3.5.8[b] Not Yet Assessed Certification blocker reuse of passwords is prohibited during the specified number of generations. -
3.5.9 3.5.9 Not Yet Assessed Certification blocker an immediate change to a permanent password is required when a temporary password is used for system logon. -
3.6.1 3.6.1[a] Not Yet Assessed Certification blocker an operational incident-handling capability is established. -
3.6.1 3.6.1[b] Not Yet Assessed Certification blocker the operational incident-handling capability includes preparation. -
3.6.1 3.6.1[c] Not Yet Assessed Certification blocker the operational incident-handling capability includes detection. -
3.6.1 3.6.1[d] Not Yet Assessed Certification blocker the operational incident-handling capability includes analysis. -
3.6.1 3.6.1[e] Not Yet Assessed Certification blocker the operational incident-handling capability includes containment. -
3.6.1 3.6.1[f] Not Yet Assessed Certification blocker the operational incident-handling capability includes recovery. -
3.6.1 3.6.1[g] Not Yet Assessed Certification blocker the operational incident-handling capability includes user response activities. -
3.6.2 3.6.2[a] Not Yet Assessed Certification blocker incidents are tracked. -
3.6.2 3.6.2[b] Not Yet Assessed Certification blocker incidents are documented. -
3.6.2 3.6.2[c] Not Yet Assessed Certification blocker authorities to whom incidents are to be reported are identified. -
3.6.2 3.6.2[d] Not Yet Assessed Certification blocker organizational officials to whom incidents are to be reported are identified. -
3.6.2 3.6.2[e] Not Yet Assessed Certification blocker identified authorities are notified of incidents. -
3.6.2 3.6.2[f] Not Yet Assessed Certification blocker identified organizational officials are notified of incidents. -
3.6.3 3.6.3 Not Yet Assessed Certification blocker the incident response capability is tested. -
3.7.1 3.7.1 Not Yet Assessed Certification blocker system maintenance is performed. -
3.7.2 3.7.2[a] Not Yet Assessed Certification blocker tools used to conduct system maintenance are controlled. -
3.7.2 3.7.2[b] Not Yet Assessed Certification blocker techniques used to conduct system maintenance are controlled. -
3.7.2 3.7.2[c] Not Yet Assessed Certification blocker mechanisms used to conduct system maintenance are controlled. -
3.7.2 3.7.2[d] Not Yet Assessed Certification blocker personnel used to conduct system maintenance are controlled. -
3.7.3 3.7.3 Not Yet Assessed Certification blocker equipment to be removed from organizational spaces for off-site maintenance is sanitized of any CUI. -
3.7.4 3.7.4 Not Yet Assessed Certification blocker media containing diagnostic and test programs are checked for malicious code before being used in organizational systems that process, store, or transmit CUI. -
3.7.5 3.7.5[a] Not Yet Assessed Certification blocker multifactor authentication is required to establish nonlocal maintenance sessions via external network connections. -
3.7.5 3.7.5[b] Not Yet Assessed Certification blocker nonlocal maintenance sessions established via external network connections are terminated when nonlocal maintenance is complete. -
3.7.6 3.7.6 Not Yet Assessed Certification blocker maintenance personnel without required access authorization are supervised during maintenance activities. -
3.8.1 3.8.1[a] Not Yet Assessed Certification blocker paper media containing CUI is physically controlled. -
3.8.1 3.8.1[b] Not Yet Assessed Certification blocker digital media containing CUI is physically controlled. -
3.8.1 3.8.1[c] Not Yet Assessed Certification blocker paper media containing CUI is securely stored. -
3.8.1 3.8.1[d] Not Yet Assessed Certification blocker digital media containing CUI is securely stored. -
3.8.2 3.8.2 Not Yet Assessed Certification blocker access to CUI on system media is limited to authorized users. -
3.8.3 3.8.3[a] Not Yet Assessed Certification blocker system media containing CUI is sanitized or destroyed before disposal. -
3.8.3 3.8.3[b] Not Yet Assessed Certification blocker system media containing CUI is sanitized before it is released for reuse. -
3.8.4 3.8.4[a] Not Yet Assessed Certification blocker media containing CUI is marked with applicable CUI markings. -
3.8.4 3.8.4[b] Not Yet Assessed Certification blocker media containing CUI is marked with distribution limitations. -
3.8.5 3.8.5[a] Not Yet Assessed Certification blocker access to media containing CUI is controlled. -
3.8.5 3.8.5[b] Not Yet Assessed Certification blocker accountability for media containing CUI is maintained during transport outside of controlled areas. -
3.8.6 3.8.6 Not Yet Assessed Certification blocker the confidentiality of CUI stored on digital media is protected during transport using cryptographic mechanisms or alternative physical safeguards. -
3.8.7 3.8.7 Not Yet Assessed Certification blocker the use of removable media on system components containing CUI is controlled. -
3.8.8 3.8.8 Not Yet Assessed Certification blocker the use of portable storage devices is prohibited when such devices have no identifiable owner. -
3.8.9 3.8.9 Not Yet Assessed Certification blocker the confidentiality of backup CUI is protected at storage locations. -
3.9.1 3.9.1 Not Yet Assessed Certification blocker individuals are screened prior to authorizing access to organizational systems. -
3.9.2 3.9.2[a] Not Yet Assessed Certification blocker a policy and/or process for terminating system access authorization and any credentials coincident with personnel actions is established. -
3.9.2 3.9.2[b] Not Yet Assessed Certification blocker system access and credentials are terminated consistent with personnel actions such as termination or transfer. -
3.9.2 3.9.2[c] Not Yet Assessed Certification blocker the system is protected during and after personnel transfer actions. -

No POA&M items yet. Update controls/objectives to NOT MET or another incomplete status to create remediation tracking.