Security Centric, Inc. FedRAMP CRM

FedRAMP Moderate Impact Level 4 - Customer Responsibility Matrix

Control Number                        Yes                        No                        Shared
AC-1: Access Control Policy and ProceduresX
AC-2: Account ManagementX
AC-2 (1): Automated System Account ManagementX
AC-2 (2): Removal of Temporary/Emergency AccountsX
AC-2 (3): Disable Inactive AccountsX
AC-2 (4): Automated Audit ActionsX
AC-2 (5): Account Monitoring/ControlX
AC-2 (7): Role-based SchemesX
AC-3: Access EnforcementX
AC-3 (3): Mandatory Access ControlX
AC-3 (4): Discretionary Access ControlX
AC-4: Information Flow EnforcementX
AC-4 (1): Discretionary Flow ControlX
AC-4 (2): Security Attribute-Based Flow ControlX
AC-5: Separation of DutiesX
AC-6: Least PrivilegeX
AC-6 (1): Access to Security FunctionsX
AC-6 (2): Non-Privileged Access for Nonsecurity FunctionsX
AC-6 (3): Auditing Use of Privileged FunctionsX
AC-6 (5): Privileged AccountsX
AC-6 (9): Auditing Access AttemptsX
AC-7: Unsuccessful Login AttemptsX
AC-8: System Use NotificationX
AC-8 (3): Role-Based Use NotificationX
AC-17: Remote AccessX
AC-17 (1): Protection of Confidentiality/Integrity of Remote AccessX
AC-17 (2): Monitoring Remote AccessX
AC-17 (3): Managed Access Control PointsX
AC-18: Wireless AccessX
AC-18 (1): Encryption of Wireless AccessX
AC-19: Access Control for Mobile DevicesX
AC-19 (5): Managed Mobile DevicesX
AC-20: Use of External Information SystemsX
AC-20 (1): Limits on Authorized UseX
AC-20 (3): External Information Systems MonitoringX
AC-21: Information SharingX
AC-22: Publicly Accessible ContentX
AT-1: Security Awareness and Training Policy and ProceduresX
AT-2: Security Awareness TrainingX
AT-3: Role-Based Security TrainingX
AT-4: Security Training RecordsX
AU-1: Audit and Accountability Policy and ProceduresX
AU-2: Audit EventsX
AU-2 (3): Centralized Management of Audit InformationX
AU-3: Content of Audit RecordsX
AU-4: Audit Storage CapacityX
AU-5: Response to Audit Processing FailuresX
AU-6: Audit Review, Analysis, and ReportingX
AU-6 (1): Process IntegrationX
AU-7: Audit Reduction and Report GenerationX
AU-8: Time StampsX
AU-9: Protection of Audit InformationX
AU-10: Non-repudiationX
AU-11: Audit Record RetentionX
AU-12: Audit GenerationX
AU-12 (1): Automated Generation of Audit RecordsX
CA-1: Security Assessment and Authorization Policy and ProceduresX
CA-2: Security AssessmentsX
CA-2 (2): Specialized Security AssessmentsX
CA-3: System InterconnectionsX
CA-5: Plan of Action and MilestonesX
CA-6: Security AuthorizationX
CA-7: Continuous MonitoringX
CA-9: Internal System ConnectionsX
CM-1: Configuration Management Policy and ProceduresX
CM-2: Baseline ConfigurationX
CM-2 (1): Automated Baseline Configuration ManagementX
CM-3: Configuration Change ControlX
CM-4: Security Impact AnalysisX
CM-5: Access Restrictions for ChangeX
CM-6: Configuration SettingsX
CM-7: Least FunctionalityX
CM-8: System Component InventoryX
CM-9: Configuration Management PlanX
CP-1: Contingency Planning Policy and ProceduresX
CP-2: Contingency PlanX
CP-2 (1): Coordination with Related PlansX
CP-3: Contingency TrainingX
CP-4: Contingency Plan TestingX
CP-4 (2): Alternate Processing Site TestX
CP-6: Alternate Storage SiteX
CP-7: Alternate Processing SiteX
CP-8: Telecommunications ServicesX
CP-9: System BackupX
IA-2: Identification and Authentication (Organizational Users)X
IA-2 (1): Multi-factor AuthenticationX
IA-2 (2): Network Access to Privileged AccountsX
IA-2 (3): Remote AccessX
IA-3: Device Identification and AuthenticationX
IA-4: Identifier ManagementX
IA-5: Authenticator ManagementX
IA-5 (1): Password-based AuthenticationX
IA-6: Authenticator FeedbackX
IA-7: Cryptographic Module AuthenticationX
IR-1: Incident Response Policy and ProceduresX
IR-2: Incident Response TrainingX
IR-3: Incident Response TestingX
IR-4: Incident HandlingX
IR-4 (1): Automated Incident HandlingX
IR-5: Incident MonitoringX
IR-6: Incident ReportingX
IR-7: Incident Response AssistanceX
IR-8: Incident Response PlanX
MA-1: System Maintenance Policy and ProceduresX
MA-2: Controlled MaintenanceX
MA-3: Maintenance ToolsX
MA-4: Nonlocal MaintenanceX
MA-5: Maintenance PersonnelX
MA-6: Timely MaintenanceX
MP-1: Media Protection Policy and ProceduresX
MP-2: Media AccessX
MP-3: Media MarkingX
MP-4: Media StorageX
MP-5: Media TransportX
MP-6: Media SanitizationX
PE-1: Physical and Environmental Protection Policy and ProceduresX
PE-2: Physical Access AuthorizationsX
PE-3: Physical Access ControlX
PE-4: Access Control for Output DevicesX
PL-1: Security Planning Policy and ProceduresX
PL-2: System Security PlanX
PL-4: Rules of BehaviorX
PL-8: Security and Privacy ArchitecturesX
PS-1: Personnel Security Policy and ProceduresX
PS-2: Position Risk DesignationX
PS-3: Personnel ScreeningX
PS-6: Access AgreementsX
RA-1: Risk Assessment Policy and ProceduresX
RA-2: Security CategorizationX
RA-3: Risk AssessmentX
RA-5: Vulnerability ScanningXX
SC-1: System and Communications Protection Policy and ProceduresX
SC-7: Boundary ProtectionX
SC-7 (1): Limiting Access PointsX
SC-8: Transmission Confidentiality and IntegrityX
SI-1: System and Information Integrity Policy and ProceduresX
SI-2: Flaw RemediationXX
SI-3: Malicious Code ProtectionXX
SI-4: Information System MonitoringXX
SR-1: Supply Chain Risk Management Policy and ProceduresX
SR-2: Supply Chain Risk Management PlanX
SR-3: Supply Chain Risk AssessmentXX
SR-4: ProvenanceX
SR-5: Acquisition StrategiesX
SR-6: Supplier AssessmentsX
SR-7: Supply Chain Risk MonitoringX
SR-8: Notifications of Supply Chain CompromiseXX
SR-9: Tamper Resistance and DetectionX
SR-10: Insider ThreatsX
SR-11: Component AuthenticityX
SR-12: Supply Chain DocumentationX