SPLA Continuous Monitoring Plan

Scottish Pride Inc.
Office of Information Services
Scottish Pride Licensing Application (SPLA)
Continuous Monitoring Plan
Version 1.0
May 28, 2013
DOCUMENT CONTROL
Change Record
Date
Author
Version
Change Reference
Quality Review History
Date
Reviewer
Comments
Approval Sign-off
Name
Role
Signature
Page 2 of 20
Date
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
TABLE OF CONTENTS
1
BACKGROUND .................................................................................................................................................4
1.1
1.2
1.3
1.4
1.5
2
REQUIREMENTS FOR CONTINUOUS MONITORING ............................................................................7
2.1
2.2
2.3
3
PURPOSE .......................................................................................................................................................4
SECURITY FRAMEWORK SYSTEM DEVELOPMENT LIFECYCLE (SDLC) .........................................................4
OBJECTIVE ....................................................................................................................................................5
RISK ..............................................................................................................................................................6
BENEFITS ......................................................................................................................................................6
CONFIGURATION MANAGEMENT AND CONTROL ..........................................................................................7
SECURITY CONTROL MONITORING ...............................................................................................................9
STATUS REPORTING AND DOCUMENTATION ............................................................................................... 11
SECURITY CONTROLS MONITORING .................................................................................................... 13
APPENDIX A – RESPONSIBILITIES .....................................................................................................................1
APPENDIX B – ANNUAL REQUIRED SECURITY CONTROLS .......................................................................1
APPENDIX C – YEAR-2 REQUIRED SECURITY CONTROLS .........................................................................1
APPENDIX D – YEAR-3 REQUIRED SECURITY CONTROLS .........................................................................1
LIST OF TABLES
Table 1: SPLA Security Controls Assessment ...................................................................................................... 14
LIST OF FIGURES
Figure 1: Security Framework System Development Life Cycle .........................................................................7
Page 3 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
1 BACKGROUND
1.1 Purpose
Continuous monitoring is one of six steps in the Risk Management Framework
described in NIST Special Publication 800‐37, Revision 1, Applying the Risk
Management Framework (RMF) to Federal Information Systems (February 2010). (See
Figure 1 below). The purpose of a continuous monitoring program is to determine if the
complete set of planned, required, and deployed security controls within an
information system or inherited by the system continue to be effective over time in light
of the inevitable changes that occur. Continuous monitoring is an important activity in
assessing the security impacts on an information system resulting from planned and
unplanned changes to the hardware, software, firmware, or environment of operation.
Agency for Enterprise Information Technology Office of Information Security
(AEIT/OIS) highly recommends agencies implement best practices identified in Florida
Information Technology Resource Security Policies and Standards identified in 71A1.001-.010, F.A.C. by formally developing a Continuous Monitoring Plan in accordance
to NIST Special Publication (SP) 800-37 Revision 1. The Agencies must categorize all
systems, identify and resolve risks, develop low-level and moderate-level system
security plans, submit moderate-level systems for Security Authorization, perform
continuous monitoring, and conduct annual reviews on the effectiveness of all security
controls. This process, developed by NIST, is known as the Security Framework System
Development Lifecycle (SDLC).
1.2 Security Framework System Development Lifecycle (SDLC)
The process to comply with AEIT/OIS moderate-level system security is documented in
the Security Framework System Development Lifecycle in Figure 1. This SDLC
addresses the steps towards compliance with the Agency for Enterprise Information
Technology Office of Information Security (AEIT/OIS) directives on information
systems security and state and federal laws.
Risk Assessments (RA) are promulgated under the AEIT/OIS directives on information
systems security and the guidelines established by NIST Special Publication (SP) 800-30,
Risk Management Guide for Information Technology Systems. AEIT requires Scottish
Pride to implement a risk-based program for cost-effective Information Technology (IT).
All business processes operate with some level of risk and one of the most effective
ways to protect these business processes is through the implementation of effective
internal security controls, risk evaluation, and risk management (RM).
A risk assessment is required before initiating Step 1 of the Security Framework System
Development Lifecycle to establish a baseline indicating the risks to system resources
Page 4 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
in the areas of Management, Operational, and Technical controls. Risks should be
assessed in the following areas: natural, environmental, human intentional and human
unintentional threats.
This plan only follows Step 8 in the Security Framework System Development
Lifecycle.




1.2.1
Step 1 System categorization was performed prior to the development of the SSP
Step’s 2-3 will be completed in the development of the SSP
Step 4 Comprehensive risk assessment will be performed by an independent
third-party assessor
Step 5 Certification and Accreditation package/approval will be performed by
an independent third-party authorizing authority identified by the CIO
Step 6 - Continuous Monitoring Plan
Step 6 is the development of the Continuous Monitoring Plan which provides oversight
and monitoring of the security controls in the information system on an ongoing basis.
The Continuous Monitoring Plan also describes the Agency’s procedural requirements
and responsibilities for implementation of the NIST SP 800-53 Revision 2, CA-7.
Continuous Monitoring security control for the Scottish Pride information system.
Continuous Monitoring begins after the system has been certified and accredited for
operations, and the activities in this plan are performed continuously throughout the
life cycle of the information system. The plan informs the CIO when changes occur that
may have an impact on the security of the system. The continuous monitoring plan will
include:





Continuous monitoring validation through spot checks, continuous scans, and
documentation updates
Configuration management and control processes for the information system
Security impact analysis on actual or proposed changes to the information
system
Assessment of selected security controls based on continuous monitoring
strategy
Security status reporting
1.3 Objective
The objective of the continuous monitoring plan is to develop a strategy and implement
a plan for the continuous monitoring of Scottish Pride Licensing Application (SPLA)
security control effectiveness taking into account any proposed/actual changes to the
Page 5 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
information system or its environment of operation. Furthermore, the Continuous
Monitoring Plan should:





Be integrated into the agency’s SDLC processes
Address the security impacts on information systems resulting from changes to
the hardware, software, firmware, or operational environment
Provide an effective mechanism to update the SSP, RA reports, and POA&M
Track the security state of the information system on a continuous basis
Maintain the security authorization for the system over time in highly dynamic
environments of operation with changing threats, vulnerabilities, technologies,
and mission/business processes
1.4 Risk
Failure to meet compliance may put Scottish Pride in harm for further security issues.
Furthermore, non-compliance with AEIT/OIS directives and Florida Statutes create a
risk of losing critical program and system resource funding.
1.5 Benefits
With a compliant monitoring program, Scottish Pride becomes more efficient in their
operations, and most importantly, more secure. In addition to reaping the benefits of
strong controls and the ability to deliver continuous compliance with current and
emerging regulations, Scottish Pride will be able to:





Reduce risk, cost and increase efficiency
Create a consistent, agency-wide view of the current security posture; creating
ties between program activities such as assessment and remediation and
showing business unit managers at all agency levels exactly where they stand in
addressing security issues
Develop automated and integrated IT processes reducing burden on
administrative staff and improving business effectiveness
Improve agency planning and strategic decision making
Create and enforce configuration management standards, and identification of
risks to all systems
Page 6 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
STEP 1
STEP 2
STEP 3
CATEGORIZE
Information Systems
SELECT
Security Controls
IMPLEMENT
Security Controls
FIPS 199/SP 800-60
FIPS 200/SP 800 -53
SP 800 Series
Define category of
information system
according to potential
impact of loss
Select minimum security
controls (i.e., safeguards
and countermeasures)
planned or in place to
protect the information
system
Implement security
controls in new or legacy
information systems;
implement security
configuration checklists
STEP 6
STEP 5
STEP 4
MONITOR
Security Controls
AUTHORIZE
Information Systems
ASSESS
Security Controls
SP 800 -53A
SP 800-37
Continuously track
changes to the
information system that
may affect security
controls and assesses
control effectiveness
Determine risk to
operations , assets , or
individuals and, if
acceptable, authorizes
information system
processing
SP 800-53A
Determine extent to which
the security controls are
implemented correctly,
operating as intended, and
producing desired outcome
with respect to meeting
security requirements
Figure 1: Risk Management Framework
2 REQUIREMENTS FOR CONTINUOUS MONITORING
Continuous Monitoring is composed of three tasks: (1) Configuration Management and
Control, (2) Security Control Monitoring, and (3) Status Reporting and Documentation.
The tasks can further be broken down into nine subtasks which are described below.
The goal of the Continuous Monitoring phase is to maintain SPLA’s authorization to
operate after certification and accreditation has been granted. This goal is achieved
through activities which provide ongoing, near-real time risk management and
operational security such as monitoring SPLA, ensuring SPLA operates in a secure
fashion and reporting status to appropriate Scottish Pride personnel.
2.1 Configuration Management and Control
Configuration Management and Control consists of developing SPLA’s monitoring
plan, monitoring SPLA for changes, and analyzing changes to determine security
impact. The System Owner shall implement the details of tasks involved in these
activities identified as:

Subtask 1: Security Control Monitoring Strategy - Develop a strategy for the
continuous monitoring of security control effectiveness and any proposed/actual
Page 7 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
changes in SPLA including hardware, software, firmware, and surrounding
environment
o Establish a strict configuration management process to support continuous
monitoring activities
o Define the methodology for conducting security impact analyses to determine
the extent to which proposed changes to SPLA or its operating environment
will affect the security state of SPLA
o Determine how many subsets of security controls will be assessed during the
authorization period, which security controls will be included in each subset,
and the schedule according to which the security control subsets will be
assessed
o Determine the tools that will be used in assessing security controls. For
example, Security Content Automation Protocol (SCAP)-validated products
should be used to verify whether the security configuration settings of
various products comply with government standards, guidance, and policies
o Document the continuous monitoring strategy
o Obtain approval for the continuous monitoring plan and strategy from the
CIO and ISM

Subtask 2: System and Environment Changes - Analyze and document the
proposal or actual changes to SPLA (including hardware, software, firmware,
and surrounding environment) to determine the security impact of such changes
o Document any relevant information about proposed changes to the
hardware, software, and firmware components, SPLA’s operating
environment, or Scottish Pride’s policies, procedures, or guidance
o Document actual changes to SPLA collecting the same information as the
proposed changes so that the actual changes can be analyzed and appropriate
Scottish Pride personnel can determine whether or not the actual change can
remain in SPLA

Subtask 3: Security Impact Analysis - Determine the security impact of the
proposed or actual changes to SPLA or the environment of operation in
accordance with the security control monitoring strategy
o Analyze each proposed/actual change to SPLA to determine what impact, if
any, the change has on the security posture of the system
o Monitor compliance of SPLA component’s configuration. If SPLA contains
information technology components for which there exists SCAP-validated
tools, those tools should be used to monitor the component’s configuration
Page 8 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
o Document the results of the security impact analysis and share the results
with the Information System Security Officer (ISSO), Information Security
Manager (ISM), and Chief Information Officer (CIO) using an approved
format
o Determine if remediation actions or other changes to SPLA are necessary
based on the security impact analysis, determine the impacts of the actions or
other changes, and document them in the Plan of Action and Milestones
(POA&M)
o If the analysis determines that there is a significant change requiring
reaccreditation of SPLA, report SPLA security status to the ISSO, CIO and
ISM
The first step is to establish a security control monitoring strategy to select which
security controls to monitor and how to monitor them effectively. Selection of security
controls for monitoring should take into consideration the importance of the security
control to SPLA and Scottish Pride. Monitoring of security controls can be done in
three ways:
1. Automated processes – Vulnerability Scanners, Web Application Scanners, Patch
Management software, Security Information and Event Management software
and Information Security Automation Program (ISAP) / Security Content
Automation Protocol (SCAP) tools
2. IT management systems – Information Technology Infrastructure Library (ITIL),
Capability Maturity Model Integration (CMMI) or other change management
solutions
3. Periodic audits – Auditing of sets of security controls on a regular basis
When a new or proposed change is identified, Scottish Pride security staff should
provide feedback to the ISSO when changes could affect the security state. Effort spent
identifying and analyzing changes should be commensurate with the security priority
of SPLA and the risk system changes might incur. Documentation of SPLA changes
should inform the System Owner and also be reflected in System Security Plan (SSP)
updates, POA&M updates, and status reports to other appropriate Scottish Pride
personnel.
2.2
Security Control Monitoring
SPLA Security Control Monitoring consists of the ongoing processes of security control
assessment and remediation actions. When security controls are identified as being
ineffective, before or during the Continuous Monitoring phase, they must be remediated. The remediation method used is the periodic review of a subset of system security
controls.
Page 9 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
This method is a compliance requirement which can be simplified through good
documentation procedures and recognizing the best practices which achieve the goals
of Security Control Monitoring. The following tasks involved in these activities are:

Subtask 4: Ongoing Security Control Assessments - Assess a selected subset of
the security controls in SPLA or the environment of operation (including those
controls affected by changes to the system/environment) in accordance with the
continuous monitoring strategy
o The System Owner should:

Assign responsibility for assessing a subset of security controls to an
assessor who has an appropriate level of independence as defined by the
CIO and the knowledge, skills, and abilities to complete the assessment

Update the POA&M after the assessment has been completed based on
the updated security assessment report provided by the security control
assessor
o The security control assessor should:


Develop the security assessment plan that defines the appropriate
procedures from NIST SP 800-53A to assess the security controls

Obtain approval for the security assessment plan from the CIO

Conduct the security assessment in accordance with the agreed-upon
procedures, personnel, milestones, and schedule

Update the security assessment report with the information gained
during the assessment of the subset of security controls and submit it to
the System Owner, ISSO, and ISM
Subtask 5: Ongoing Remediation Actions - Conduct remediation actions based
on the results of the selected security control assessments and outstanding items
in the POA&M. The System Owner should initiate remediation actions based on
the findings produced during the continuous monitoring assessments of the
security controls, the outstanding items listed in the POA&M, and the results of
performing the activities required by the system’s security control (e.g.,
vulnerability scanning, contingency plan testing, incident response handling).
The System Owner should:
o Consult with the ISSO, ISM, and CIO and review each assessor finding and
determine the severity or seriousness of the finding and whether the finding
is significant enough to be worthy of further investigation or remedial
action
Page 10 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
o Determine the appropriate steps required to correct any identified
weaknesses or deficiencies that require remediation efforts, establish an
implementation plan and schedule for the defined actions, and update the
POA&M with the planned remediation actions
o Assess SPLA after the remediation actions have been completed to
determine if the security controls remain effective after changes have been
implemented
o Update the POA&M with the current status when a remediation action has
been successfully completed
The System Owner needs to revisit, on a regular basis, the risk management activities
described in the Risk Management Framework Figure 1 (Page 3) to ensure the selection
of security controls remains appropriate for SPLA. The System Owner should:

Monitor events that occur throughout Scottish Pride and determine if those
events introduce or uncover new vulnerabilities or threats to SPLA

Determine whether the selected security controls remain sufficient to protect the
information and SPLA assets against the newly identified vulnerabilities and
threats

Reconfirm SPLA’s impact level and security category of SPLA and the
information processed, stored, or transmitted by SPLA and determine if they
should be changed

Consult with the ISSO, ISM, and CIO to determine if the authorization should be
updated
2.3 Status Reporting and Documentation
Status Reporting and Documentation consists of Critical Document Updates, Security
Status Reporting, Ongoing Risk Determination and Acceptance, and System Removal
and Decommissioning. The overall goal is to ensure that the documentation describing
the security status of SPLA does not become stale.
The POA&M is particularly important to keep current because it reflects a single aspect
of SPLA, the controls known to have been inadequate. The SSP should also be updated
on an ongoing basis to support the near real-time view of SPLA’s security posture.
When SPLA system status changes occur, they must be documented and presented to
the appropriate agency officials. Significant changes may require the ISSO to consider
whether the risk(s) presented requires reconsideration of the operating status of the
system. Additionally, these updates should be periodic and ensure all affected Scottish
Pride staff is aware of SPLA’s status. Details of tasks involved in these activities are:

Subtask 6: Critical Document Updates - Update the SSP, security assessment
report, and POA&M based on the results of the continuous monitoring process.
Page 11 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
Continuous monitoring provides System Owners with an effective tool for
producing ongoing updates to SSPs, security assessment reports, and POA&Ms.
These documents are critical to understanding and explicitly accepting risk on a
day-to-day basis. The System Owner should:
o Ensure that the security control assessor updates the security assessment
report with the results of the security control assessments conducted during
the continuous monitoring phase
o Update the SSP and POA&M to identify changes to SPLA, the operating
environment, the security controls, and the implementation of the SPLA’s
security controls
o Preserve the original version of the documents so that they are available for
oversight, management, security control assessments, and auditing purposes
o Share the updated documentation with others

Subtask 7: Security Status Reporting - The System Owner should document the
results of the continuous monitoring activities in security status reports and
provide them to the ISSO, ISM, and CIO. The System Owner should:
o Describe the continuous monitoring activities and how the vulnerabilities
discovered during the security control assessments and security impact
analyses are being addressed
o Provide the security status reports to the ISSO, ISM, and CIO at appropriate
Scottish Pride defined frequencies

Subtask 8: Ongoing Risk Determination and Acceptance - Periodically review
the reported security status of SPLA and determine whether the risk to Scottish
Pride operations and assets, individuals, other organizations, or the Nation
remains acceptable. The System Owner should provide sufficient information to
the ISSO, ISM, and CIO for them to be able to make appropriate reauthorization
decisions. The ISSO, ISM, and CIO should:
o Review the updated security assessment report, SSP, POA&M, and security
status reports to determine whether the risk to the information and SPLA
remains acceptable
o Determine whether SPLA requires reauthorization
o Document the decision and forward it to the System Owner for appropriate
action

Subtask 9: System Removal and Decommissioning - Implement an Scottish
Pride approved SPLA decommissioning strategy, when needed, which executes
required actions when SPLA is removed from service. When SPLA is removed
from operation, the System Owner should ensure that all security controls
Page 12 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
addressing SPLA decommissioning are implemented. The System Owner
should:
o Determine a decommissioning strategy for SPLA when SPLA is no longer
needed by Scottish Pride
o Keep users and application owners served by the decommissioned SPLA or
system components informed about the decommissioning activities and any
issues associated with their information or applications
o Sanitize or destroy SPLA components in accordance with applicable
regulations and guidance to remove system information from SPLA media so
that there is reasonable assurance that the information cannot be retrieved or
reconstructed
o Update Scottish Pride’s tracking and management systems to identify the
specific SPLA components that are being removed from the inventory
o
Record the decommissioned status of SPLA in the SSP and distribute the
document to appropriate individuals or agencies
3 SECURITY CONTROLS MONITORING
The following schedule in Table 1 shall be established by the System Owner for
continuous monitoring security control assessment to ensure that all controls requiring
assessment are covered and that all controls are assessed at least once during the threeyear accreditation cycle.


Year 1 – Full accreditation, all security controls assessed
Year 2 – All security controls required to be assessed annually (See Appendix B),
plus a subset of the remainder of security controls (See Appendix C) must be
assessed
 Year 3 – All security controls required to be assessed annually (See Appendix B),
plus a subset of security controls (See Appendix D) that were not assessed
during Year 2 must be assessed
As it is not feasible or cost-effective to monitor all of the security controls in SPLA on a
continuous basis, an appropriate subset of those controls for the annual assessment
shall be selected. The selection of a subset of security controls for continuous
monitoring assessment includes the following considerations:
 Annual Security Control Requirements – Those security controls that require
annual assessment as identified by NIST SP 800-53
 Significant changes to SPLA – A significant change to SPLA, or its operating
environment, may introduce new security vulnerabilities and may require a
more frequent assessment of select security controls
 External Influences – Activities outside the direct control of SPLA which may
impact security posture. Examples may include, but are not limited to,
organizational changes, new or modified policies, and newly identified threats or
vulnerabilities
Page 13 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services


Scottish Pride Requirements – Those security controls that Scottish Pride deems
essential to protecting SPLA may require increased attention, and more frequent
assessment
Plan of Action and Milestone (POA&M) Items – New or modified security
controls, implemented to remediate identified weaknesses, should be assessed
for effectiveness
Table 1: SPLA Security Controls Assessment
Control
Number
Control Name
Frequency
Access Control (AC)
AC-1
Access Control Policy and Procedures
Year 1
AC-2
Account Management
Year 1
AC-3
Access Enforcement
Year 1
Year 2
AC-4
Information Flow Enforcement
Year 1
Year 2
AC-5
Separation of Duties
Year 1
Year 3
AC-6
Least Privilege
Year 1
Year 3
AC-7
Unsuccessful Logon Attempts
Year 1
AC-8
System Use Notification
Year 1
Year 3
AC-11
Session Lock
Year 1
Year 3
AC-12
Session Termination
Year 1
Year 3
AC-13
Supervision and Review – Access Control
Year 1
AC-14
Permitted Actions w/o Identification or
Authentication
Year 1
AC-17
Remote Access
Year 1
AC-18
Wireless Access Restrictions
Year 1
Year 3
AC-19
Access Control for Portable and Mobile
Systems
Year 1
Year 3
AC-20
Use of External Information Systems
Year 1
Page 14 of 20
Year 2
Annual
Annual
Annual
Year 2
Annual
Year 2
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
Awareness and Training (AT)
AT-1
Security Awareness and Training Policies
and Procedures
Year 1
Year 2
AT-2
Security Awareness
Year 1
Annual
AT-3
Security Training
Year 1
Annual
AT-4
Security Training Records
Year 1
Year 2
Audit and Accountability (AU)
AU-1
Audit and Accountability Policy and
Procedures
Year 1
Year 2
AU-2
Auditable Events
Year 1
Annual
AU-3
Content of Audit Records
Year 1
Annual
AU-4
Audit Storage Capacity
Year 1
Annual
AU-5
Response to Audit Processing Failures
Year 1
Annual
AU-6
Audit Monitoring, Analysis, and Reporting
Year 1
Annual
AU-7
Audit Reduction and Report Generation
Year 1
Annual
AU-8
Time Stamps
Year 1
Year 2
AU-9
Protection of Audit Information
Year 1
Year 2
AU-11
Audit Retention
Year 1
Annual
Certification, Accreditation, and Security Assessments (CA)
CA-1
Certification, Accreditation, and Security
Assessment Policies and Procedures
Year 1
Year 2
CA-2
Security Assessments
Year 1
Year 2
CA-3
Information System Connections
Year 1
Year 2
CA-4
Security Certification
Year 1
Year 2
CA-5
Plan of Action and Milestones
Year 1
Year 2
CA-6
Security Accreditation
Year 1
CA-7
Continuous Monitoring
Year 1
Year 3
Year 2
Configuration Management (CM)
CM-1
Configuration Management Policy and
Procedures
Year 1
CM-2
Baseline Configuration
Year 1
Annual
CM-3
Configuration Change Control
Year 1
Annual
CM-4
Monitoring Configuration Changes
Year 1
Annual
CM-5
Access Restrictions for Change
Year 1
Annual
CM-6
Configuration Settings
Year 1
Annual
Page 15 of 20
Year 2
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
CM-7
Least Functionality
Year 1
Annual
CM-8
Information System Component Inventory
Year 1
Annual
Contingency Planning (CP)
CP-1
Contingency Management Policy and
Procedures
Year 1
Year 2
CP-2
Contingency Plan
Year 1
Annual
CP-3
Contingency Training
Year 1
Annual
CP-4
Contingency Plan Testing and Exercises
Year 1
Annual
CP-5
Contingency Plan Updates
Year 1
Annual
CP-6
Alternate Storage Sites
Year 1
Annual
CP-7
Alternate Processing Sites
Year 1
Annual
CP-8
Telecommunication Services
Year 1
Annual
CP-9
Information System Backup
Year 1
Annual
CP-10
Information System Recovery and
Reconstitution
Year 1
Annual
Identification and Authentication (IA)
IA-1
Identification and Authentication Policy
and Procedures
Year 1
Year 2
IA-2
User Identification and Authentication
Year 1
IA-3
Device Identification and Authentication
Year 1
IA-4
Identifier Management
Year 1
Annual
IA-5
Authenticator Management
Year 1
Annual
IA-6
Authenticator Feedback
Year 1
Annual
Year 3
Year 2
Incident Response (IR)
IR-1
Incident Response Policy and Procedures
Year 1
IR-2
Incident Response Training
Year 1
IR-3
Incident Response Testing and Exercises
Year 1
Year 2
IR-4
Incident Handling
Year 1
Year 2
IR-5
Incident Monitoring
Year 1
Annual
IR-6
Incident Reporting
Year 1
Annual
IR-7
Incident Response Assistance
Year 1
Page 16 of 20
Year 2
Annual
Year 2
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
Maintenance (MA)
MA-1
System Maintenance Policy and Procedures
Year 1
Year 2
MA-2
Controlled Maintenance
Year 1
Annual
MA-3
Maintenance Tools
Year 1
Annual
MA-4
Remote Maintenance
Year 1
Annual
MA-5
Maintenance Personnel
Year 1
Annual
MA-6
Timely Maintenance
Year 1
Annual
Media Protection (MP)
MP-1
Media Protection Policy and Procedures
Year 1
Year 2
MP-2
Media Access
Year 1
Year 3
MP-4
Media Storage
Year 1
Year 3
MP-5
Media Transport
Year 1
Annual
MP-6
Media Sanitization and Disposal
Year 1
Annual
Physical and Environmental Protection PE)
PE-1
Physical and Environmental Protection
Policy Procedures
Year 1
PE-2
Physical Access Authorizations
Year 1
Annual
PE-3
Physical Access Control
Year 1
Annual
PE-5
Access Control for Display Medium
Year 1
PE-6
Monitoring Physical Access
Year 1
Annual
PE-7
Visitor Control
Year 1
Annual
PE-8
Access Records
Year 1
Year 2
PE-9
Power Equipment and Power Cabling
Year 1
Year 2
PE-10
Emergency Shutoff
Year 1
Year 2
PE-11
Emergency Power
Year 1
Year 2
PE-12
Emergency Lighting
Year 1
Annual
PE-13
Fire Protection
Year 1
Annual
PE-14
Temperature and Humidity Controls
Year 1
Annual
PE-16
Delivery and Removal
Year 1
Annual
PE-17
Alternate Work Site
Year 1
PE-18
Location of Information System
Components
Year 1
Page 17 of 20
Year 2
Year 2
Year 3
Year 2
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
Planning (PL)
PL-1
Security Planning Policy and Procedures
Year 1
PL-2
System Security Plan
Year 1
PL-3
System Security Plan Update
Year 1
PL-4
Rules of Behavior
Year 1
PL-5
Privacy Impact Assessment
Year 1
PL-6
Security Related Activity Planning
Year 1
Year 2
Year 3
Year 2
Annual
Year 3
Annual
Personnel Security (PS)
PS-1
Personnel Security Policy and Procedures
Year 1
Year 2
PS-2
Position Categorization
Year 1
PS-3
Personnel Screening
Year 1
Annual
PS-4
Personnel Termination
Year 1
Annual
PS-5
Personal Transfer
Year 1
Annual
PS-6
Access Agreements
Year 1
Annual
PS-7
Third-Party Personnel Security
Year 1
Annual
PS-8
Personnel Sanctions
Year 1
Year 3
Year 3
Risk Assessment (RA)
RA-1
Risk Assessment Policy and Procedures
Year 1
Year 2
RA-2
Security Categorization
Year 1
Year 3
RA-3
Risk Assessment
Year 1
Year 3
RA-4
Risk Assessment Update
Year 1
Year 3
RA-5
Vulnerability Scanning
Year 1
Year 2
System and Services Acquisition (SA)
SA-1
System and Services Acquisition Policy and
Procedures
Year 1
Year 2
SA-2
Allocation of Resources
Year 1
Year 2
SA-3
Life Cycle Support
Year 1
Year 2
SA-4
Acquisitions
Year 1
SA-5
Information System Documentation
Year 1
Year 2
SA-6
Software Usage Restrictions
Year 1
Year 2
SA-7
User Installed Software
Year 1
SA-8
Security Engineering Principle
Year 1
SA-9
External Information System Services
Year 1
Year 3
SA-11
Developer Security Testing
Year 1
Year 3
Page 18 of 20
Annual
Annual
Year 2
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
System and Communication Protection (SC)
SC-1
System and Communications Protection
Policy and Procedures
Year 1
Year 2
SC-2
Application Partitioning
Year 1
Year 2
SC-4
Information Remnance
Year 1
SC-5
Denial of Service Protection
Year 1
SC-7
Boundary Protection
Year 1
Annual
SC-8
Transmission Integrity
Year 1
Annual
SC-9
Transmission Confidentiality
Year 1
Year 3
SC-10
Network Disconnect
Year 1
Year 3
SC-14
Public Access Protections
Year 1
Year 3
SC-17
Public Key Infrastructure Certificates
Year 1
SC-18
Mobile Code
Year 1
Year 2
SC-19
Voice Over Internet Protocol
Year 1
Year 2
SC-20
Secure Name/Address Resolution Service
(Authoritative Source)
Year 1
Year 2
SC-22
Architecture and Provisioning for
Name/Address Resolution Service
Year 1
Year 2
SC-23
Session Authenticity
Year 1
Annual
Year 3
Annual
Year 3
System and Information Integrity (SI)
SI-1
System and Information Integrity Policy
and Procedures
Year 1
SI-2
Flaw Remediation
Year 1
SI-3
Malicious Code Protection
Year 1
SI-4
Information System Monitoring Tools and
Techniques
Year 1
Annual
SI-5
Security Alerts and Advisories
Year 1
Annual
SI-8
Spam and Spyware Protection
Year 1
Year 3
SI-9
Information Input Restrictions
Year 1
Year 3
SI-10
Information Input Accuracy, Completeness,
and Validity
Year 1
Annual
SI-11
Error Handling
Year 1
Annual
SI-12
Output Handling and Retention
Year 1
Annual
Page 19 of 20
Year 2
Annual
Year 3
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring Plan
Office of Information Services
Additional Security Controls
Any critical volatile security controls, as determined by
the System Owner
Annual
The CIO may identify Agency security controls and/or
designate additional SPLA security controls for annual
assessment
Annual
Page 20 of 20
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring
Office of Information Services
Plan
APPENDIX A – RESPONSIBILITIES
Title
System Owner
Information Systems
Security Officer (ISSO)
Information Security
Manager (ISM)
Role
Monitor
Supporter
Overseer
Responsibility

May designate a representative to perform continuous
monitoring security control assessments as required for the
annual report to the CIO

Develop and document a continuous monitoring strategy for
their information systems

Be responsible for continuous monitoring security control
assessment activities

Ensure resources are provided for the continuous monitoring
security control assessment activities for SPLA

Report to the ISSO, any significant changes made to SPLA that
may cause an impact to the security status and require a
reaccreditation of SPLA

Participate in the agency’s configuration management process

Establish and maintain an inventory of SPLA’s components

Conduct security impact analyses on all changes to SPLA

Conduct security assessments of security controls according to
their continuous monitoring strategies

Prepare and submit security status reports at the monthly

Conduct remediation activities as necessary to maintain the
current authorization status

Update the selection of security controls for SPLA when
events occur that indicate the baseline set of security controls
is no longer adequate to protect SPLA

Update critical security documents on a regular basis

Provide oversight to continuous monitoring security control
assessment activities for SPLA, ensuring completion and
reporting no later than July 31st of each fiscal year

Provide an assessment and recommendation to the System
Owner and CIO as to the need for reaccreditation as a result of
a reported or identified significant change to SPLA

Participate in the formal configuration management process

Support the information owner on the continuous monitoring
security control assessment procedures to complete security
responsibilities

Ensure Agency annual security controls are certified annually

Prepare and submit Agency metrics on continuous monitoring
security control assessments as required for the annual
Scottish Pride report satisfying auditing requirements

Participate in the formal configuration management process
Appendix A - 1
Scottish Pride
Scottish Pride Licensing Application
Continuous Monitoring
Office of Information Services
Plan
Title
Chief Information
Officer (CIO)
Role
Leader
Responsibility









User
Operations Manager
(GeoSol)
Advisor
Supporter
Ensure an effective continuous monitoring program is
established for the organization
Establish expectations/requirements for the agency’s
continuous monitoring process
Provide funding, personnel, and other resources to support
continuous monitoring
Maintain high-level communications and working group
relationships among agency entities
Ensure that information systems are covered by an approved
security plan, are authorized to operate, and are monitored
throughout the system development life cycle
Ensure completion of continuous monitoring security control
assessments on SPLA
Ensure Scottish Pride CIO designated and/or common
security controls are certified annually
Determine whether a significant change to SPLA requires
reaccreditation and advise the ISSO and ISM of such a
decision
Review SPLA security weaknesses reported that was
identified during the continuous monitoring security control
assessment activities

Identify changes to mission, business, or operational security
requirements
•
Report any weaknesses in, or new requirements for, SPLA
operations
•
Submit and justify system change requests to the through the
agency’s formal configuration management process
•
Support the information owner/information System Owner to
complete security responsibilities
•
Participate in the formal configuration management process
Appendix A - 2
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
APPENDIX B – ANNUAL REQUIRED SECURITY CONTROLS
The following security controls should be monitored annually:
AC-2
Access Controls (AC)
Account Management: Scottish Pride manages information system accounts, including
establishing, activating, modifying, reviewing, disabling, and removing accounts. Scottish
Pride reviews information system accounts annually.
AC-7
Unsuccessful Logon Attempts: The information system enforces a limit of three
consecutive invalid access attempts by a user during a 30 minute time period. The
information system automatically locks the account/node for 30 minutes for low systems
or until an appropriate security administrator manually intervenes to unlock accounts on
moderate and high systems when the maximum number of unsuccessful attempts is
exceeded.
AC-13
Supervision and Review—Access Control: Scottish Pride supervises and reviews the
activities of users with respect to the enforcement and usage of information system access
controls.
AC-17
Remote Access: Scottish Pride documents, monitors, and controls all methods of remote
access (e.g., dial-up, Internet) to the information system including remote access for
privileged functions. Appropriate Scottish Pride officials authorize each remote access
method for the information system and authorize only the necessary users for each access
method.
AT-2
AT-3
AU-2
Awareness and Training (AT)
Security Awareness: Scottish Pride ensures all users (including managers and senior
executives) are exposed to basic information system security awareness materials before
authorizing access to the system and at least annually thereafter.
Security Training: Scottish Pride identifies personnel with significant information system
security roles and responsibilities, documents those roles and responsibilities, and
provides appropriate information system security training before authorizing access to the
system and each year thereafter.
Audit and Accountability (AU)
Auditable Events: The information system generates audit records for events identified in
the Scottish Pride IT Security Handbook.
AU-3
Content of Audit Records: The information system captures sufficient information in
audit records to establish what events occurred, the sources of the events, and the
outcomes of the events.
AU-4
Audit Storage Capacity: Scottish Pride allocates sufficient audit record storage capacity
and configures auditing to prevent such capacity being exceeded.
Appendix B - 1
Scottish Pride
Office of Information Services
Plan
AU-5
Scottish Pride Licensing Application
Continuous Monitoring
Audit and Accountability (AU)
Response to Audit Processing Failures: In the event of an audit failure or audit storage
capacity being reached, the information system alerts appropriate Scottish Pride officials
and takes the following additional actions:
 Shutdown the system
 Overwrite the oldest audit records
 Stop generating audit records
AU-6
Audit Monitoring, Analysis, and Reporting: Scottish Pride regularly reviews/analyzes
audit records for indications of inappropriate or unusual activity, investigates suspicious
activity or suspected violations, report’s findings to appropriate officials, and takes
necessary actions.
AU-7
Audit Reduction and Report Generation: The information system provides an audit
reduction and report generation capability.
AU-11
Audit Retention: Scottish Pride retains audit logs in accordance with Scottish Pride
records retention policies, but at least for one year for high and moderate systems to
provide support for after-the-fact investigations of security incidents and to meet
regulatory and Scottish Pride information retention requirements.
CM-2
Configuration Management (CM)
Baseline Configuration: Scottish Pride develops, documents, and maintains a current,
baseline configuration of the information system and an inventory of the system’s
constituent components.
CM-3
Configuration Change Control: Scottish Pride documents and controls changes to the
information system. Appropriate Scottish Pride officials approve information system
changes in accordance with Scottish Pride policies and procedures.
CM-4
Monitoring Configuration Changes: Scottish Pride monitors changes to the information
system and conducts security impact analyses to determine the effects of the changes.
CM-5
Access Restrictions for Change: Scottish Pride enforces access restrictions associated with
changes to the information system.
CM-6
Configuration Settings: Scottish Pride configures the security settings of information
technology products to the most restrictive mode consistent with information system
operational requirements.
CM-7
Least Functionality: Scottish Pride configures the information system to provide only
essential capabilities and specifically prohibits and/or restricts the use of any protocol or
service that is not explicitly permitted.
Information System Component Inventory: Scottish Pride develops, documents, and
maintains a current inventory of the components of the information system and relevant
ownership information.
CM-8
Appendix B - 2
Scottish Pride
Office of Information Services
Plan
CP-1
Scottish Pride Licensing Application
Continuous Monitoring
Contingency Planning (CP)
Contingency Planning Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, contingency planning policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the contingency planning
policy and associated contingency planning controls.
CP-2
Contingency Plan: Scottish Pride develops and implements a contingency plan for the
information system addressing contingency roles, responsibilities, assigned individuals
with contact information, and activities associated with restoring the system after a
disruption or failure. Designated officials within Scottish Pride review and approve the
contingency plan and distribute copies of the plan to key contingency personnel.
CP-3
Contingency Training: Scottish Pride trains personnel in their contingency roles and
responsibilities with respect to the information system and provides refresher training
annually.
CP-4
Contingency Plan Testing and Exercises: Scottish Pride tests the contingency plan for the
information system at least annually using to determine the plan’s effectiveness and
Scottish Pride’s readiness to execute the plan. System rated as high shall be tested at the
alternate processing site. Appropriate officials within Scottish Pride review the
contingency plan test results and initiate corrective actions.
CP-5
Contingency Plan Update: Scottish Pride reviews the contingency plan for the information
system once per year and revises the plan to address system/organizational changes or
problems encountered during plan implementation, execution, or testing.
CP-6
Alternate Storage Sites: Scottish Pride identifies an alternate storage site and initiates
necessary agreements to permit the storage of information system backup information.
CP-7
Alternate Processing Site: Scottish Pride identifies an alternate processing site and initiates
necessary agreements to permit the resumption of information system operations for
critical mission/business functions within 24 hours when the primary processing
capabilities are unavailable.
CP-8
Telecommunications Services: Scottish Pride identifies primary and alternate
telecommunications services to support the information system and initiates necessary
agreements to permit the resumption of system operations for critical mission/business
functions within 24 hours when the primary telecommunications capabilities are
unavailable.
CP-9
Information System Backup: Scottish Pride conducts backups of user-level and systemlevel information (including system state information) contained in the information system
according to backup schedules documented in the system contingency plan and stores
backup information at an appropriately secured location.
CP-10
Information System Recovery and Reconstitution: Scottish Pride employs mechanisms
with supporting procedures to allow the information system to be recovered and
reconstituted to the system’s original state after a disruption or failure.
Appendix B - 3
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
Identification and Authentication (IA)
IA-4
Identifier Management: Scottish Pride manages user identifiers by: (1) uniquely
identifying each user; (2) verifying the identity of each user; (3) receiving authorization to
issue a user identifier from an appropriate Scottish Pride official; (4) ensuring that the user
identifier is issued to the intended party; (5) disabling user identifier after 30 days of
inactivity; and (6) archiving user identifiers.
IA-5
Authenticator Management: Scottish Pride manages information system authenticators
(e.g., tokens, PKI certificates, biometrics, passwords, key cards) by: (1) defining initial
authenticator content; (2) establishing administrative procedures for initial authenticator
distribution, for lost/compromised, or damaged authenticators, and for revoking
authenticators; and (3) changing default authenticators upon information system
installation.
IA-6
Authenticator Feedback: The information system provides feedback to a user during an
attempted authentication and that feedback does not compromise the authentication
mechanism.
IR-2
Incident Response (IR)
Incident Response Training: Scottish Pride trains personnel in their incident response
roles and responsibilities with respect to the information system and provides refresher
training at least annually.
IR-5
Incident Monitoring: Scottish Pride tracks and documents information system security
incidents on an ongoing basis.
IR-6
Incident Reporting: Scottish Pride promptly reports incident information to appropriate
authorities.
MA-2
MA-3
Maintenance (MA)
Controlled Maintenance: Scottish Pride schedules, performs, and documents routine
preventative and regular maintenance on the components of the information system in
accordance with manufacturer or vendor specifications and/or Scottish Pride
requirements.
Maintenance Tools: Scottish Pride approves, controls, and monitors the use of information
system maintenance tools and maintains the tools on an ongoing basis.
MA-4
Remote Maintenance: Scottish Pride approves, controls, and monitors remotely executed
maintenance and diagnostic activities.
MA-5
Maintenance Personnel: Scottish Pride maintains a list of personnel authorized to perform
maintenance on the information system. Only authorized personnel perform maintenance
on the information system.
MA-6
Timely Maintenance: Scottish Pride obtains maintenance support and spare parts within
48 hours of failure.
Appendix B - 4
Scottish Pride
Office of Information Services
Plan
MP-5
MP-6
PE-2
Scottish Pride Licensing Application
Continuous Monitoring
Media Protection (MP)
Media Transport: Scottish Pride controls information system media (paper and electronic)
and restricts the pickup, receipt, transfer, and delivery of such media to authorized
personnel.
Media Sanitization and Disposal: Scottish Pride sanitizes information system digital
media using approved equipment, techniques, and procedures. Scottish Pride tracks,
documents, and verifies media sanitization actions and periodically tests sanitization
equipment/procedures to ensure correct performance.
Physical and Environmental Protection (PE)
Physical Access Authorizations: Scottish Pride develops and keeps current lists of
personnel with authorized access to facilities containing information systems (except for
those areas within the facilities officially designated as publicly accessible) and issues
appropriate authorization credentials (e.g., badges, identification cards, smart cards).
Designated officials within Scottish Pride review and approve the access list and
authorization credentials once a year.
PE-3
Physical Access Control: Scottish Pride controls all physical access points (including
designated entry/exit points) to facilities containing information systems (except for those
areas within the facilities officially designated as publicly accessible) and verifies
individual access authorizations before granting access to the facilities. Scottish Pride also
controls access to areas officially designated as publicly accessible, as appropriate, in
accordance with Scottish Pride’s assessment of risk.
PE-6
Monitoring Physical Access: Scottish Pride monitors physical access to information
systems to detect and respond to incidents.
PE-7
Visitor Control: Scottish Pride controls physical access to information systems by
authenticating visitors before authorizing access to facilities or areas other than areas
designated as publicly accessible.
PE-12
Emergency Lighting: Scottish Pride employs and maintains automatic emergency lighting
systems that activate in the event of a power outage or disruption and that cover
emergency exits and evacuation routes.
PE-13
Fire Protection: Scottish Pride employs and maintains fire suppression and detection
devices/systems that can be activated in the event of a fire.
PE-14
Temperature and Humidity Controls: Scottish Pride regularly maintains within
acceptable levels and monitors the temperature and humidity within facilities containing
information systems.
PE-16
Delivery and Removal: Scottish Pride controls information system-related items (i.e.,
hardware, firmware, software) entering and exiting the facility and maintains appropriate
records of those items.
Appendix B - 5
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
Planning (PL)
PL-3
System Security Plan Update: Scottish Pride reviews the security plan for the information
system annually and revises the plan to address system/organizational changes or
problems identified during plan implementation or security control assessments.
PL-4
Rules of Behavior: Scottish Pride establishes and makes readily available to all
information system users a set of rules that describes their responsibilities and expected
behavior with regard to information system usage. Scottish Pride receives signed
acknowledgement from users indicating that they have read, understand, and agree to
abide by the rules of behavior, before authorizing access to the information system.
PL-6
Security-Related Activity Planning: Scottish Pride plans and coordinates security-related
activities affecting the information system before conducting such activities in order to
reduce the impact on Scottish Pride operations (i.e., mission, functions, image, and
reputation), Scottish Pride assets, and individuals.
Personal Security (PS)
PS-3
Personnel Screening: Scottish Pride screens individuals requiring access to Scottish Pride
information and information systems before authorizing access.
PS-4
Personnel Termination: When employment is terminated, Scottish Pride terminates
information system access, conducts exit interviews, ensures the return of all Scottish Pride
information system-related property (e.g., keys, identification cards, building passes), and
ensures that appropriate personnel have access to official records created by the terminated
employee that are stored on Scottish Pride information systems.
PS-5
Personnel Transfer: Scottish Pride reviews information systems/facilities access
authorizations when individuals are reassigned or transferred to other positions within
Scottish Pride and initiates appropriate actions (e.g., reissuing keys, identification cards,
building passes; closing old accounts and establishing new accounts; and changing system
access authorizations).
PS-6
Access Agreements: Scottish Pride completes appropriate access agreements (e.g.,
nondisclosure agreements, acceptable use agreements, rules of behavior, conflict-of-interest
agreements) for individuals requiring access to Scottish Pride information and information
systems before authorizing access.
PS-7
Third-Party Personnel Security: Scottish Pride establishes personnel security requirements
for third-party providers (e.g., service bureaus, contractors, and other organizations
providing information system development, information technology services, outsourced
applications, network and security management) and monitors provider compliance to
ensure adequate security.
Appendix B - 6
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
System and Services Acquisition (SA)
SA-4
Acquisitions: Scottish Pride includes security requirements and/or security specifications,
either explicitly or by reference, in information system acquisition contracts based on an
assessment of risk.
SA-7
User Installed Software: Scottish Pride enforces explicit rules governing the downloading
and installation of software by users.
SC-4
System and Communication Protection (SC)
Information Remnance: The information system prevents unauthorized and unintended
information transfer via shared system resources.
SC-7
Boundary Protection: The information system monitors and controls communications at
the external boundary of the information system and at key internal boundaries within the
system.
SC-17
Public Key Infrastructure Certificates: Scottish Pride develops and implements a
certificate policy and certification practice statement for the issuance of public key
certificates used in the information system.
SI-2
System and Information Integrity (SI)
Flaw Remediation: Scottish Pride identifies, reports, and corrects information system
flaws.
SI-4
Information System Monitoring Tools and Techniques: Scottish Pride employs tools and
techniques to monitor events on the information system, detect attacks, and provide
identification of unauthorized use of the system.
SI-5
Security Alerts and Advisories: Scottish Pride receives information system security
alerts/advisories on a regular basis, issues alerts/advisories to appropriate personnel, and
takes appropriate actions in response.
SI-10
Information Input Accuracy, Completeness, and Validity: The information system
checks information inputs for accuracy, completeness, and validity.
SI-11
Error Handling: The information system identifies and handles error conditions in an
expeditious manner.
SI-12
Output Handling and Retention: Scottish Pride handles and retains output from the
information system in accordance with Scottish Pride policy and operational requirements.
Appendix B - 7
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
APPENDIX C – YEAR-2 REQUIRED SECURITY CONTROLS
Year 2 monitoring should include all security controls required to be assessed annually
(See Appendix B), plus a subset of the remainder of security controls below must be
assessed.
AC-1
Access Controls (AC)
Access Control Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, access control policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the access control policy and
associated access controls.
AC-3
Access Enforcement: The information system enforces assigned authorizations for
controlling access to the system in accordance with applicable policy.
AC-4
Information Flow Enforcement: The information system enforces assigned authorizations
for controlling the flow of information within the system and between interconnected
systems in accordance with applicable policy.
AC-14
Permitted Actions w/o Identification or Authentication: Scottish Pride identifies specific
user actions that can be performed on the information system without identification or
authentication.
AC-20
Use of External Information Systems: Scottish Pride restricts the use of personally owned
information systems for official U.S. Government business involving the processing,
storage, or transmission of federal information.
AT-1
AT-4
Awareness and Training (AT)
Security Awareness and Training Policy and Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, security
awareness and training policy that addresses purpose, scope, roles, responsibilities, and
compliance; and (2) formal, documented procedures to facilitate the implementation of the
security awareness and training policy and associated security awareness and training
controls.
Security Training Records: Scottish Pride documents and monitors individual information
system security training activities including basic security awareness training and specific
information system security training.
Appendix C - 1
Scottish Pride
Office of Information Services
Plan
AU-1
Scottish Pride Licensing Application
Continuous Monitoring
Audit and Accountability (AU)
Audit and Accountability Policy and Procedures: Scottish Pride develops, disseminates,
and periodically reviews/updates: (1) a formal, documented, audit and accountability
policy that addresses purpose, scope, roles, responsibilities, and compliance; and (2)
formal, documented procedures to facilitate the implementation of the audit and
accountability policy and associated audit and accountability controls.
AU-8
Time Stamps: The information system provides time stamps for use in audit record
generation.
AU-9
Protection of Audit Information: The information system protects audit information and
audit tools from unauthorized access, modification, and deletion.
Certification, and Accreditation, and Security Assessments(CA)
CA-1
CA-2
CA-3
CA-4
CA-5
CA-7
Certification, Accreditation, and Security Assessment Policies and Procedures: Scottish
Pride develops, disseminates, and periodically reviews/updates: (1) formal, documented,
security assessment and certification and accreditation policies that address purpose,
scope, roles, responsibilities, and compliance; and (2) formal, documented procedures to
facilitate the implementation of the security assessment and certification and accreditation
policies and associated assessment, certification, and accreditation controls.
Security Assessments: Scottish Pride conducts an assessment of the security controls in the
information system annually to determine the extent to which the controls are
implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements for the system.
Information System Connections: Scottish Pride authorizes all connections from the
information system to other information systems outside of the accreditation boundary
and monitors/controls the system interconnections on an ongoing basis. Appropriate
Scottish Pride officials approve information system interconnection agreements.
Security Certification: Scottish Pride conducts an assessment of the security controls in the
information system to determine the extent to which the controls are implemented
correctly, operating as intended, and producing the desired outcome with respect to
meeting the security requirements for the system.
Plan of Action and Milestones: Scottish Pride develops and updates quarterly, a POA&M
for the information system that documents Scottish Pride’s planned, implemented, and
evaluated remedial actions to correct any deficiencies noted during the assessment of the
security controls and to reduce or eliminate known vulnerabilities in the system.
Continuous Monitoring: Scottish Pride monitors the security controls in the information
system on an ongoing basis.
Appendix C - 2
Scottish Pride
Office of Information Services
Plan
CM-1
CP-1
Scottish Pride Licensing Application
Continuous Monitoring
Configuration Management (CM)
Configuration Management Policy and Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, configuration
management policy that addresses purpose, scope, roles, responsibilities, and compliance;
and (2) formal, documented procedures to facilitate the implementation of the
configuration management policy and associated configuration management controls.
Contingency Planning (CP)
Contingency Planning Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, contingency planning policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the contingency planning
policy and associated contingency planning controls.
Identification and Authentication (IA)
IA-1
Identification and Authentication Policy and Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, identification
and authentication policy that addresses purpose, scope, roles, responsibilities, and
compliance; and (2) formal, documented procedures to facilitate the implementation of the
identification and authentication policy and associated identification and authentication
controls.
IA-3
Device Identification and Authentication: The information system identifies and
authenticates specific devices before establishing a connection.
IR-1
Incident Response (IR)
Incident Response Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, incident response policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the incident response policy
and associated incident response controls.
IR-3
Incident Response Testing and Exercises: Scottish Pride tests the incident response
capability for the information system at least annually using automated mechanisms for
high systems to determine the incident response effectiveness and documents the results.
IR-4
Incident Handling: Scottish Pride implements an incident handling capability for security
incidents that includes preparation, detection and analysis, containment, eradication, and
recovery.
IR-7
Incident Response Assistance: Scottish Pride provides an incident support resource that
offers advice and assistance to users of the information system for the handling and
reporting of security incidents. The support resource is an integral part of Scottish Pride’s
incident response capability.
Appendix C - 3
Scottish Pride
Office of Information Services
Plan
MA-1
MP-1
PE-1
Scottish Pride Licensing Application
Continuous Monitoring
Maintenance (MA)
System Maintenance Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, information system maintenance
policy that addresses purpose, scope, roles, responsibilities, and compliance; and (2)
formal, documented procedures to facilitate the implementation of the information system
maintenance policy and associated system maintenance controls.
Media Protection (MP)
Media Protection Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, media protection policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the media protection policy
and associated media protection controls.
Physical and Environmental Protection (PE)
Physical and Environmental Protection Policy and Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, physical and
environmental protection policy that addresses purpose, scope, roles, responsibilities, and
compliance; and (2) formal, documented procedures to facilitate the implementation of the
physical and environmental protection policy and associated physical and environmental
protection controls.
PE-5
Access Control for Display Medium: Scottish Pride controls physical access to
information system devices that display information to prevent unauthorized individuals
from observing the display output.
PE-8
Access Records: Scottish Pride maintains a visitor access log to facilities (except for those
areas within the facilities officially designated as publicly accessible) that includes: (1)
name and organization of the person visiting; (2) signature of the visitor; (3) form of
identification; (4) date of access; (5) time of entry and departure; (6) purpose of visit; and
(7) name and organization of person visited. Visitor logs are reviewed at closeout,
maintained on file, and available for further review for one year.
PE-9
Power Equipment and Power Cabling: Scottish Pride protects power equipment and
power cabling for the information system from damage and destruction.
PE-10
Emergency Shutoff: For specific locations within a facility containing concentrations of
information system resources (e.g., data centers, server rooms, mainframe rooms),Scottish
Pride provides the capability of shutting off power to any information technology
component that may be malfunctioning (e.g., due to an electrical fire) or threatened (e.g.,
due to a water leak) without endangering personnel by requiring them to approach the
equipment.
PE-11
Emergency Power: Scottish Pride provides a short-term uninterruptible power supply to
facilitate an orderly shutdown of the information system in the event of a primary power
source loss.
PE-18
Location of Information System Components: Scottish Pride positions information
Appendix C - 4
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
system components within the facility to minimize potential damage from physical and
environmental hazards and to minimize the opportunity for unauthorized access.
Planning (PL)
PL-1
Security Planning Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, security planning policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the security planning policy
and associated security planning controls.
Personal Security (PS)
PS-1
RA-1
RA-5
Personnel Security Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented, personnel security policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the personnel security policy
and associated personnel security controls.
Risk Assessment (RA)
Risk Assessment Policy and Procedures: Scottish Pride develops, disseminates, and
periodically reviews/updates: (1) a formal, documented risk assessment policy that
addresses purpose, scope, roles, responsibilities, and compliance; and (2) formal,
documented procedures to facilitate the implementation of the risk assessment policy and
associated risk assessment controls.
Vulnerability Scanning: Using appropriate vulnerability scanning tools and techniques,
Scottish Pride scans for vulnerabilities in the information system every six months or when
significant new vulnerabilities affecting the system are identified and reported.
System and Services Acquisition (SA)
SA-1
System and Services Acquisition Policy and Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, system and
services acquisition policy that addresses purpose, scope, roles, responsibilities, and
compliance; and (2) formal, documented procedures to facilitate the implementation of the
system and services acquisition policy and associated system and services acquisition
controls.
SA-2
Allocation of Resources: Scottish Pride determines, documents, and allocates as part of its
capital planning and investment control process the resources required to protect the
system.
SA-3
Life Cycle Support: Scottish Pride manages the information system using a system
development life cycle methodology that includes information security considerations.
SA-5
Information System Documentation: Scottish Pride ensures that adequate documentation
for the information system and its constituent components are available, protected when
required, and distributed to authorized personnel.
Appendix C - 5
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
Continuous Monitoring
SA-6
Software Usage Restrictions: Scottish Pride complies with software usage restrictions.
SA-8
Security Engineering Principles: Scottish Pride designs and implements the information
system using security engineering principles.
System and Communication Protection (SC)
System & Communications Protection Policy & Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, system and
communications protection policy that addresses purpose, scope, roles, responsibilities,
and compliance; and (2) formal, documented procedures to facilitate the implementation of
the system and communications protection policy and associated system and
communications protection controls.
SC-1
SC-2
Application Partitioning: The information system separates user functionality (including
user interface services) from information system management functionality.
SC-18
Mobile Code: Scottish Pride: (1) establishes usage restrictions and implementation
guidance for mobile code technologies based on the potential to cause damage to the
information system if used maliciously; and (2) documents, monitors, and controls the use
of mobile code within the information system. Appropriate Scottish Pride officials
authorize the use of mobile code.
Voice Over Internet Protocol: Scottish Pride: (1) establishes usage restrictions and
implementation guidance for Voice Over Internet Protocol (VOIP) technologies based on
the potential to cause damage to the information system if used maliciously; and (2)
documents, monitors, and controls the use of VOIP within the information system.
Appropriate Scottish Pride officials authorize the use of VOIP.
SC-19
SC-20
Secure Name/Address Resolution Service (Authoritative Source): The information
system that provides name/address resolution service provides additional data origin and
integrity artifacts along with the authoritative data it returns in response to resolution
queries.
SC-22
Architecture and Provisioning For Name/Address Resolution Service: The information
systems that collectively provide name/address resolution service for Scottish Pride are
fault tolerant and implement role separation.
SI-1
System and Information Integrity (SI)
System and Information Integrity Policy and Procedures: Scottish Pride develops,
disseminates, and periodically reviews/updates: (1) a formal, documented, system and
information integrity policy that addresses purpose, scope, roles, responsibilities, and
compliance; and (2) formal, documented procedures to facilitate the implementation of the
system and information integrity policy and associated system and information integrity
controls.
Appendix C - 6
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
System Security
APPENDIX D – YEAR-3 REQUIRED SECURITY CONTROLS
Year 3 monitoring should include all security controls required to be assessed annually
(See Appendix B), plus a subset of security controls below that were not assessed
during Year 2 must be assessed.
AC-5
Access Controls (AC)
Separation of Duties: The information system enforces separation of duties through
assigned access authorizations.
AC-6
Least Privilege: The information system enforces the most restrictive set of
rights/privileges or accesses needed by users (or processes acting on behalf of users) for
the performance of specified tasks.
AC-8
System Use Notification: The information system displays an approved, system use
notification message before granting system access informing potential users: (1) that the
user is accessing a U.S. Government information system; (2) that system usage may be
monitored, recorded, and subject to audit; (3) that unauthorized use of the system is
prohibited and subject to criminal and civil penalties; and (4) that use of the system
indicates consent to monitoring and recording. The system use notification message
provides appropriate privacy and security notices (based on associated privacy and
security policies or summaries) and remains on the screen until the user takes explicit
actions to log on to the information system.
AC-12
Session Termination: The information system automatically terminates a session after ten
minutes of inactivity.
AC-18
Wireless Access Restrictions: Scottish Pride: (1) establishes usage restrictions and
implementation guidance for wireless technologies; and (2) documents, monitors, and
controls wireless access to the information system. Appropriate Scottish Pride officials
authorize the use of wireless technologies.
AC-19
Access Control for Portable and Mobile Systems: Scottish Pride: (1) establishes usage
restrictions and implementation guidance for portable and mobile devices; and (2)
documents, monitors, and controls device access to Scottish Pride networks. Appropriate
Scottish Pride officials authorize the use of portable and mobile devices.
Certification, and Accreditation, and Security Assessments(CA)
CA-6
Security Accreditation: Scottish Pride authorizes (i.e., accredits) the information system for
processing before operations and updates the authorization every 3 years. A senior
Scottish Pride official signs and approves the security accreditation.
Appendix D - 1
Scottish Pride
Office of Information Services
Plan
Scottish Pride Licensing Application
System Security
Identification and Authentication (IA)
IA-2
MP-2
MP-4
User Identification and Authentication: The information system uniquely identifies and
authenticates users (or processes acting on behalf of users).
Media Protection (MP)
Media Access: Scottish Pride ensures that only authorized users have access to information
in printed form or on digital media removed from the information system.
Media Storage: Scottish Pride physically controls and securely stores information system
media, both paper and electronic, based on the highest FIPS 199 security category of the
information recorded on the media.
Planning (PL)
PL-2
System Security Plan: Scottish Pride develops and implements a security plan for the
information system that provides an overview of the security requirements for the system
and a description of the security controls in place or planned for meeting those
requirements. Designated officials within Scottish Pride review and approve the plan.
PL-5
Privacy Impact Assessment: Scottish Pride conducts a privacy impact assessment on the
information system.
Personal Security (PS)
PS-2
Position Categorization: Scottish Pride assigns a risk designation to all positions and
establishes screening criteria for individuals filling those positions. Scottish Pride reviews
and revises position risk designations periodically in accordance with Office of Personnel
Management (OPM) guidance.
PS-8
Personnel Sanctions: Scottish Pride employs a formal sanctions process for personnel
failing to comply with established information security policies and procedures.
Appendix D - 2
Scottish Pride
Office of Information Services
Plan
RA-2
Scottish Pride Licensing Application
System Security
Risk Assessment (RA)
Security Categorization: Scottish Pride categorizes the information system and the
information processed, stored, or transmitted by the system in accordance with FIPS 199
and documents the results (including supporting rationale) in the system security plan.
Designated senior-level officials within Scottish Pride review and approve the security
categorizations.
RA-3
Risk Assessment: Scottish Pride conducts assessments of the risk and magnitude of harm
that could result from the unauthorized access, use, disclosure, disruption, modification, or
destruction of information and information systems that support the operations and assets
of the agency.
RA-4
Risk Assessment Update: Scottish Pride updates the risk assessment every three years or
whenever there are significant changes to the information system, the facilities where the
system resides, or other conditions that may impact the security or accreditation status of
the system.
System and Services Acquisition (SA)
SA-9
External Information System Services: Scottish Pride ensures that third-party providers of
information system services employ adequate security controls in accordance with
applicable federal laws, directives, policies, regulations, standards, guidance, and
established service level agreements. Scottish Pride monitors security control compliance.
SA-11
Developer Security Testing: The information system developer creates a security test and
evaluation plan, implements the plan, and documents the results. Developmental security
test results may be used in support of the security certification and accreditation process
for the delivered information system.
SC-5
System and Communication Protection (SC)
Denial of Service Protection: The information system protects against or limits the effects
of denial of service attacks on devices within Scottish Pride’s internal network.
SC-9
Transmission Confidentiality: The information system protects the confidentiality of
transmitted information.
SC-10
Network Disconnect: The information system terminates a network connection at the end
of a session or after ten minutes of inactivity.
SC-14
Public Access Protections: For publicly available systems, the information system protects
the integrity of the information and applications.
SC-23
Session Authenticity: The information system provides mechanisms to protect the
authenticity of communications sessions.
Appendix D - 3
Scottish Pride
Office of Information Services
Plan
SI-3
Scottish Pride Licensing Application
System Security
System and Information Integrity (SI)
Malicious Code Protection: The information system implements malicious code
protection that includes a capability for automatic updates.
SI-8
Spam and Spyware Protection: The information system implements spam and spyware
protection.
SI-9
Information Input Restrictions: Scottish Pride restricts the information input to the
information system to authorized personnel only.
Appendix D - 4