2022 CA Security Assessment and Authorization Standard
2022 CA Security Assessment and Authorization Standard
Questions about the policies outlined in this document should be directed to Information
Assurance Services (IAS) at OCIO_IAS@ed.gov
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
APPROVAL
____________________________________________________
Steven Hernandez
Director, IAS/Chief Information Security Officer (CISO)
Version 1.2 i
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Revision History
The table below identifies all changes that have been incorporated into this document.
Version 1.2 ii
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Table of Contents
1 INTRODUCTION ................................................................................................................................ 1
1.1 Purpose.......................................................................................................................................... 1
1.2 Scope............................................................................................................................................. 1
2 STANDARDS....................................................................................................................................... 1
2.1 CA-1 Policy and Procedures (P, L, M, H) .................................................................................... 2
2.2 CA-2 Control Assessments (P, L, M, H and Control Overlay)..................................................... 3
2.3 CA-3 Information Exchange (L, M, H) ........................................................................................ 4
2.4 CA-5 Plan of Action and Milestones (POA&M) (P, L, M, H and Control Overlay) ................... 5
2.5 CA-6 Authorization (P, L, M, H and Control Overlay) ................................................................ 5
2.6 CA-7 Continuous Monitoring (P, L, M, H and Control Overlay)................................................. 6
2.7 CA-8 Penetration Testing (H and Control Overlay) ..................................................................... 8
2.8 CA-9 Internal System Connections (L, M, H) .............................................................................. 9
3 RISK ACCEPTANCE/POLICY EXCEPTIONS ............................................................................... 10
4 ACRONYMS...................................................................................................................................... 11
5 APPENDIX A - BASELINE CONTROL PARAMETER SUMMARY............................................ 13
6 APPENDIX B - AUTHORIZATION DECISION ............................................................................. 19
7 APPENDIX C - ONGOING SECURITY AUTHORIZATION CRITERIA...................................... 21
Version 1.2 i
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
1 INTRODUCTION
1.1 Purpose
The Federal Information Security Modernization Act (FISMA) 1 and implementing regulation
Office of Management and Budget (OMB) Circular A-130, Managing Information as a Strategic
Resource 2, requires each federal agency to develop, document, and implement an agency-wide
program to provide information security for the information and information systems that
support the operations and assets of the agency, including those provided or managed by another
agency, contractor, or other source, and services that are either fully or partially provided,
including agency-hosted, outsourced, and cloud-based solutions. Federal Information Processing
Standards (FIPS) Publication 200, Minimum Security Requirements for Federal Information and
Information Systems 3, mandates the use of National Institute of Standards and Technology
(NIST) Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems
and Organizations 4, as baseline information system controls.
This governance document establishes Department information technology (IT) system security
assessment and authorization controls standards necessary to improve the efficiency of operation
or security of Department information systems and comply with Federal laws, regulations,
Executive Orders, Emergency Orders, Binding Operational Directives, and Department
Administrative Communications System (ACS) directives and policies. In doing so, these
standards supersede any prior governance documentation establishing such standards.
1.2 Scope
These standards apply to all information and information systems that support the operations and
assets of the Department, including those provided or managed by another agency, contractor, or
other source, as well as services that are either fully or partially provided, including Department-
hosted, outsourced, and cloud-based solutions. Principal Offices, employees, contractors,
external service providers and system users are required to comply with these security
assessment and authorization control standards.
2 STANDARDS
The Department standards for IT system security assessment and authorization controls are
organized to follow the order in which controls are presented in the current version of NIST SP
800-53. To define a control baseline for Department information systems, a FIPS 199
categorization level (e.g., Low (L), Moderate (M) and High (H)) is assigned to each requirement.
This designator indicates a requirement applies to information systems categorized at that FIPS
199 impact-level. Designators are also used to indicate when NIST SP 800-53 Privacy (P)
1
Public Law 113-283-Dec. 18, 2014, https://www.congress.gov/113/plaws/publ283/PLAW-113publ283.pdf
2 Office of Management and Budget (OMB) Circular A-130,
https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/circulars/A130/a130revised.pdf
3 FIPS 200, https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.200.pdf
4 NIST SP 800-53, https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
Version 1.2 1
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
baseline controls are required. To manage risk to within the Department’s risk tolerance and
appetite, control overlays are provided when the Department requires implementation of
control(s) that are not required by the FIPS 199 impact-level or privacy baseline. In addition to
the controls required by this standard, High Value Assets (HVAs) must implement and comply
with the current version of the HVA Control Overlay issued and maintained by the Department
of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA).
This standard directly supports the Department’s integration of the NIST Cyber Security
Framework (CSF) in focusing on using business drivers to guide cybersecurity activities and
considering cybersecurity risks as part of the Department’s risk management processes. Refer to
Appendix A for a summary of controls by baseline and corresponding NIST CSF categories and
subcategories.
Version 1.2 2
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
IAS Branch Chiefs shall review security assessment and authorization procedures annually (i.e.,
each fiscal year) and following the identification of evolving threats, issuance of new or
significantly changed existing Federal laws, executive orders, directives, regulations, and ED
policies, identification of emerging technology and information technology service delivery
models and determination that adjustments are deemed necessary to improve its effectiveness
based upon feedback from Principal Office personnel.
Principal Office personnel including Information System Owners (ISO) and Information System
Security Officers (ISSOs) are required to manage the development, documentation, and
dissemination of system specific procedures to facilitate the implementation of the Department’s
security assessment and authorization policy and the associated controls. The ISO and ISSO shall
review security assessment and authorization procedures annually (i.e., each fiscal year) and
following the identification of evolving threats, issuance of new or significantly changed existing
Federal laws, executive orders, directives, regulations, and ED policies, identification of
emerging technology and information technology service delivery models and determination that
adjustments are deemed necessary to improve its effectiveness based upon feedback from
Principal Office personnel.
Version 1.2 3
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Control Overlay CA-2 ED-01 (L, M, H): Assess information systems within the Department’s
FISMA inventory to determine the extent of operational risk posed to the organization and its
mission in order to be granted an Authorization to Operate (ATO) from the AO.
Control Overlay CA-2 ED-02 (L, M, H): Include non-FISMA reportable subsystems in the
assessment of the parent FISMA reportable system.
Control Overlay CA-2 ED-03 (L, M, H): Use the Cyber Security Assessment and Management
(CSAM) tool to review, assess, maintain, track and report on the status (e.g., implemented, not
implemented) of required controls (e.g., baseline controls and control overlays).
Control Overlay CA-2 ED-04 (L, M, H): Complete all required authorization documentation as
established in the Information Technology System Planning (PL) Standard prior to assessing a
system.
Control Overlay CA-2 ED-05 (L, M, H): Reuse existing FedRAMP third party assessor
organization (3PAO) reports available from the FedRAMP Program Management Office to
assess FedRAMP authorized cloud service providers
Control Overlay CA-2 ED-06 (L, M, H): Leverage FedRAMP tailored test cases specific for
FedRAMP Tailored when conducting an assessment or self-assessment of FedRAMP Tailored
Low Impact-Software as a Service (LI-SaaS) cloud service providers.
Control Overlay CA-2 ED-07 (L, M, H): Accept Inter-Agency Agreement (IAA) in lieu of
performing an assessment of ED Shared Services.
Version 1.2 4
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
2.4 CA-5 Plan of Action and Milestones (POA&M) (P, L, M, H and Control
Overlay)
a. Develop a plan of action and milestones for the system to document the planned
remediation actions of the organization to correct weaknesses or deficiencies noted
during the assessment of the controls and to reduce or eliminate known vulnerabilities in
the system; and
b. Update existing plan of action and milestones monthly, at minimum, based on the
findings from control assessments, independent audits or reviews, and continuous
monitoring activities.
Control Overlay CA-5 ED-01 (L, M, H): Create, monitor, manage, track and report enterprise-
level and system-level POA&Ms in CSAM in accordance with the current version of the
Department’s POA&M Standard Operating Procedures.
Control Overlay CA-5 ED-02 (L, M, H): Document a user-defined criticality in CSAM for all
new POA&Ms created and injected as well as for all open POA&M(s) in accordance with the
current version of the Department’s POA&M SOP.
Control Overlay CA-5 ED-03 (L, M, H): Receive approval from CSP vendors at the time of
authorization to inject POA&M information into CSAM; when approval is not obtained, then the
maximum CSF Risk Scorecard score will be limited.
Control Overlay CA-5 ED-04 (L, M, H): Inject FedRAMP Cloud Service Provider (CSP)
POA&M information into CSAM, when Principal Offices sponsor a Department ATO for the
CSP and direct approval from the CSP vendor to inject the CSP POA&Ms into CSAM is
received.
Version 1.2 5
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
e. Update the authorizations in accordance with the terms and conditions established by the
AO.
Control Overlay CA-6 ED-01 (L, M, H): Designate the ED CIO as the defacto AO for all Ed
systems unless specifically delegated otherwise.
Control Overlay CA-6 ED-02 (L, M, H): Identify in a formal authorization memo signed by the
AO the authorization decision as defined in Appendix B: Authorization Decision. Document and
report the status of the ATO or Ongoing Security Authorization (OSA) in CSAM.
Control Overlay CA-6 ED-03 (L, M, H): Take actions required to register into the Department’s
FISMA inventory and then shut down, migrate, or authorize any information systems and
services discovered processing, storing, transmitting, or disseminating information on behalf of
the Department or Principal Operating Component (POC) without a valid ATO.
Control Overlay CA-6 ED-04 (L, M, H): Ensure the CSF Risk Scorecard maintains a score of
“0.00” for all unauthorized information systems and services operating without an ATO until the
system or service is authorized in accordance with the Department’s policies. Systems scored as
“0.00” negatively impact POC scores and are briefed to Department senior leadership at least
monthly. Score unauthorized systems/services that adhere to OCIO requirements for achieving
an ATO as a “1.00” for a safe harbor period specified by the CISO or delegate and based on
system impact levels. Based upon an assessment of risk, the respective AO may render a Denial
of Authorization decision.
Control Overlay CA-6 ED-05 (L, M, H): Based upon an assessment of risk, the respective AO
may explicitly accept the risk for the operation of the system and grant an ATO to
systems/services which are pursuing migration or authorization and are 1) registered in CSAM as
operational; 2) scheduled for assessment; and 3) are actively working to complete required
assessment and authorization processes defined within the Department’s policies, standards, and
processes.
Control Overlay CA-6 ED-06 (L, M, H): Authorize Federal Shared Services via an Inter-Agency
Agreement (IAA).
Version 1.2 6
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 7
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
appetite represents the target risk profile for a system, Principal Office and the extent to which
the Department is comfortable with the accepting ongoing persistent cybersecurity risk. The risk
appetite coincides with the calculated risk level of ‘2.00’ on a scale of ‘0.00-3.00’ within the ED
CSF Risk Scorecard. Therefore, systems are expected to maintain a minimum level of ‘2.00’ as
the risk appetite while the system is operational. Systems and system stakeholders must strive for
level 3.00 by performing actions to mitigate risks and vulnerabilities.
The cyber risk tolerance represents the amount of cybersecurity risk the Department is prepared
to temporarily accept in pursuit of its mission/business. For systems operating within the
Department’s IT environment, the risk tolerance coincides with the calculated risk level of ‘1.00’
point on a scale from ‘0.00 – 3.00’ within the ED CSF Risk Scorecard. Therefore, systems may
temporarily perform down to a ‘1.00’ as mission and business necessity demand. The formal
process for cyber risk tolerance acceptance is the Department’s security authorization process for
issuing and maintaining an ATO.
Control Overlay CA-7(4) ED-04 (L, M, H): Coordinate the Department’s Cyber Risk program
with the Department’s ERM function to maintain awareness of the cyber risk of the organization.
Provide tolerance and appetite information to all levels of the organization through updates with
a frequency determined by the Governance, Risk and Policy Branch in coordination with the
Department’s ERM function.
Version 1.2 8
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
attestation stating its testing equipment, software and services are free from all
vulnerabilities as noted in the national vulnerability database. Any exceptions are noted
and the reasoning as to why the vulnerability cannot be addressed.
c. Description of antivirus software installed on each testing machine and verification that
it is up to date with the most recent definitions.
d. The Federal Information Processing Standards certification numbers identifying the
encryption standards used on each testing machine for all encryption.
e. When assessors are furnished with ED government furnished equipment and services
(GFES) deployed with the Department authorized Virtual Private Network (VPN)
software, only the GFES may be used to establish a “tunnel” to access the Department’s
network for any non-government furnished equipment (non-GFES) testing machines.
f. When drone virtual machines are used to conduct remote assessments, the drones will be
configured to make use of a secure outbound connection to the internet. The connection
is established via FIPS-140-2/3 validated (certificate provided as noted in “d”) Public
Key infrastructure with an AES256 cypher being used. PKI connection keys must be
established by or provided to ED SOC for appropriate monitoring and analysis of the
encrypted traffic.
Control Overlay CA-8 ED-04 (H): Limit the use of whitelisting of testing equipment; when it is
required to conduct testing of specific development environments, whitelisting should be
documented and restricted to a specific target range of internet protocol and system access.
Control Overlay CA-8 ED-05 (H): Ensure the AO or designated representative reviews and
approves the penetration test plan, including the rules of engagement, prior to initiating any
penetration testing activities.
Version 1.2 9
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
following: (1) zero trust architecture standards, guidance, and memorandums from
Cybersecurity and Infrastructure Security Agency (CISA), Office of Management and
Budget (OMB) or NIST; (2) targeted responses to certain types of incidents; 3) time-of-
day restrictions on system use, if implemented; or 4) thirty (30) minutes of session
inactivity. System-level activities, established by a virtual private network (VPN)
connection, are authorized to continue after strict user interactions have ended to support
remote system patching; and
d. Review at least annually (i.e., each fiscal year) the continued need for each internal
connection.
3 RISK ACCEPTANCE/POLICY EXCEPTIONS
Deviations from the Department policies, Instructions, Standards, Procedures or Memos must be
approved and documented through the Department’s Risk Acceptance process. Deviations that
introduce additional risks to the enterprise must be submitted through the Department Risk
Acceptance Form (RAF) and must be approved by the ED CISO (as delegated). Requests must
justify the reason for the deviation(s)/exception(s) as well as the compensating security controls
implemented to secure the device or information, if applicable. Policy deviations that do not
introduce additional risks do not need to be submitted through the Department RAF but will need to
be approved by the Department CISO (as delegated).
Version 1.2 10
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
4 ACRONYMS
Version 1.2 11
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 12
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 13
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 14
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 15
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 16
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 17
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 18
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 19
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Authorization
Description
Decision
reviewing the risk assessment and authorization package and any additional
inputs provided. This means that the information system is not authorized to
operate and cannot be placed into operation within the Department’s
operating environment. If the system is currently in operation, all activity is
halted. A Denial of Authorization indicates that there are major weaknesses
or deficiencies in the security controls employed within or inherited by the
information system.
Version 1.2 20
Information Technology (IT) System Security Assessment and Authorization (CA) Standard
Version 1.2 21