0% found this document useful (0 votes)
97 views25 pages

2022 CA Security Assessment and Authorization Standard

This document establishes the U.S. Department of Education's standards for information technology system security assessment and authorization controls. It requires all Department IT systems to comply with controls from NIST SP 800-53 based on their FIPS 199 impact level of Low, Moderate or High. The standards are organized by control family and assign implementation levels to each control. Additional requirements beyond the NIST baselines, called control overlays, are specified to manage risk within the Department's tolerance. High Value Assets must also comply with controls in the DHS High Value Asset Control Overlay. The purpose is to improve system security and efficiency and comply with federal laws and policies like FISMA.

Uploaded by

Donald
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views25 pages

2022 CA Security Assessment and Authorization Standard

This document establishes the U.S. Department of Education's standards for information technology system security assessment and authorization controls. It requires all Department IT systems to comply with controls from NIST SP 800-53 based on their FIPS 199 impact level of Low, Moderate or High. The standards are organized by control family and assign implementation levels to each control. Additional requirements beyond the NIST baselines, called control overlays, are specified to manage risk within the Department's tolerance. High Value Assets must also comply with controls in the DHS High Value Asset Control Overlay. The purpose is to improve system security and efficiency and comply with federal laws and policies like FISMA.

Uploaded by

Donald
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Information Technology (IT)

System Security Assessment and


Authorization (CA) Standard

January 31, 2022

U.S. Department of Education (ED)


Office of the Chief Information Officer (OCIO)
Information Assurance Services (IAS)

Questions about the policies outlined in this document should be directed to Information
Assurance Services (IAS) at OCIO_IAS@ed.gov
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

APPROVAL

Digitally signed by Steven


Steven Hernandez

Hernandez Date: 2022.02.01


16:00:43 -05'00'

____________________________________________________
Steven Hernandez
Director, IAS/Chief Information Security Officer (CISO)

Version 1.2 i
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Revision History

The table below identifies all changes that have been incorporated into this document.

Version Date Summary of Changes


Initial draft of new
standard which combines NIST SP
800-53, Revision 5 controls,
1.0 12/22/2021
including ED specific control
parameter values, with existing policy
standards.

Update to incorporate feedback


from Information Assurance Services
1.1 1/14/2022
(IAS), Governance, Risk and Policy
(GRP) Team.

Update to incorporate feedback from


IAS; address new security measures
required by Executive Order (EO)
14028, including Office of
1.2 1/31/2022
Management and Budget (OMB)
regulations and memoranda and
updated NIST guidance issued to
comply with the EO.

Version 1.2 ii
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Table of Contents
1 INTRODUCTION ................................................................................................................................ 1
1.1 Purpose.......................................................................................................................................... 1
1.2 Scope............................................................................................................................................. 1
2 STANDARDS....................................................................................................................................... 1
2.1 CA-1 Policy and Procedures (P, L, M, H) .................................................................................... 2
2.2 CA-2 Control Assessments (P, L, M, H and Control Overlay)..................................................... 3
2.3 CA-3 Information Exchange (L, M, H) ........................................................................................ 4
2.4 CA-5 Plan of Action and Milestones (POA&M) (P, L, M, H and Control Overlay) ................... 5
2.5 CA-6 Authorization (P, L, M, H and Control Overlay) ................................................................ 5
2.6 CA-7 Continuous Monitoring (P, L, M, H and Control Overlay)................................................. 6
2.7 CA-8 Penetration Testing (H and Control Overlay) ..................................................................... 8
2.8 CA-9 Internal System Connections (L, M, H) .............................................................................. 9
3 RISK ACCEPTANCE/POLICY EXCEPTIONS ............................................................................... 10
4 ACRONYMS...................................................................................................................................... 11
5 APPENDIX A - BASELINE CONTROL PARAMETER SUMMARY............................................ 13
6 APPENDIX B - AUTHORIZATION DECISION ............................................................................. 19
7 APPENDIX C - ONGOING SECURITY AUTHORIZATION CRITERIA...................................... 21

Version 1.2 i
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

1 INTRODUCTION

1.1 Purpose
The Federal Information Security Modernization Act (FISMA) 1 and implementing regulation
Office of Management and Budget (OMB) Circular A-130, Managing Information as a Strategic
Resource 2, requires each federal agency to develop, document, and implement an agency-wide
program to provide information security for the information and information systems that
support the operations and assets of the agency, including those provided or managed by another
agency, contractor, or other source, and services that are either fully or partially provided,
including agency-hosted, outsourced, and cloud-based solutions. Federal Information Processing
Standards (FIPS) Publication 200, Minimum Security Requirements for Federal Information and
Information Systems 3, mandates the use of National Institute of Standards and Technology
(NIST) Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems
and Organizations 4, as baseline information system controls.
This governance document establishes Department information technology (IT) system security
assessment and authorization controls standards necessary to improve the efficiency of operation
or security of Department information systems and comply with Federal laws, regulations,
Executive Orders, Emergency Orders, Binding Operational Directives, and Department
Administrative Communications System (ACS) directives and policies. In doing so, these
standards supersede any prior governance documentation establishing such standards.

1.2 Scope
These standards apply to all information and information systems that support the operations and
assets of the Department, including those provided or managed by another agency, contractor, or
other source, as well as services that are either fully or partially provided, including Department-
hosted, outsourced, and cloud-based solutions. Principal Offices, employees, contractors,
external service providers and system users are required to comply with these security
assessment and authorization control standards.
2 STANDARDS
The Department standards for IT system security assessment and authorization controls are
organized to follow the order in which controls are presented in the current version of NIST SP
800-53. To define a control baseline for Department information systems, a FIPS 199
categorization level (e.g., Low (L), Moderate (M) and High (H)) is assigned to each requirement.
This designator indicates a requirement applies to information systems categorized at that FIPS
199 impact-level. Designators are also used to indicate when NIST SP 800-53 Privacy (P)

1
Public Law 113-283-Dec. 18, 2014, https://www.congress.gov/113/plaws/publ283/PLAW-113publ283.pdf
2 Office of Management and Budget (OMB) Circular A-130,
https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/circulars/A130/a130revised.pdf
3 FIPS 200, https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.200.pdf
4 NIST SP 800-53, https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final

Version 1.2 1
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

baseline controls are required. To manage risk to within the Department’s risk tolerance and
appetite, control overlays are provided when the Department requires implementation of
control(s) that are not required by the FIPS 199 impact-level or privacy baseline. In addition to
the controls required by this standard, High Value Assets (HVAs) must implement and comply
with the current version of the HVA Control Overlay issued and maintained by the Department
of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA).
This standard directly supports the Department’s integration of the NIST Cyber Security
Framework (CSF) in focusing on using business drivers to guide cybersecurity activities and
considering cybersecurity risks as part of the Department’s risk management processes. Refer to
Appendix A for a summary of controls by baseline and corresponding NIST CSF categories and
subcategories.

2.1 CA-1 Policy and Procedures (P, L, M, H)


The Department shall develop, document, and disseminate to all ED employees, contractors, and
users authorized to access to ED information systems, or systems operated or maintained on
behalf of ED, or ED information as defined in OCIO: 3-112/ACSD-OCIO-004, Cybersecurity
Policy a Department-level security assessment and authorization policy (e.g., this document)
that:
(a) addresses purpose, scope, roles, responsibilities, management commitment, coordination
among organizational entities, and compliance; and
(b) is consistent with applicable laws, executive orders, directives, regulations, policies,
standards, and guidelines.
(c) authorizes the Department Chief Information Security Officer (CISO) and Department
Chief Information Officer (CIO) to issue subordinate standards, procedures, and memos,
with the same authority and enforcement as OCIO: 3-112/ACSD-OCIO-004,
Cybersecurity Policy.
The Department CISO in conjunction with the Senior Agency Official for Privacy (SAOP) are
designated to manage the development, documentation, and dissemination of the Department-
level IT system security assessment and authorization policy.
This policy shall be reviewed and updated annually (i.e., each fiscal year) and following the
identification of evolving threats, issuance of new or significantly changed existing Federal laws,
executive orders, directives, regulations, and ED policies, identification of emerging technology
and information technology service delivery models and determination that adjustments are
deemed necessary to improve its effectiveness based upon feedback from Principal Office
personnel.
The Office of the Chief Information Officer (OCIO), Information Assurance Services (IAS)
manage the development, documentation, and dissemination of the Department-level IT system
security assessment and authorization standard operating procedures in support of this standard.

Version 1.2 2
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

IAS Branch Chiefs shall review security assessment and authorization procedures annually (i.e.,
each fiscal year) and following the identification of evolving threats, issuance of new or
significantly changed existing Federal laws, executive orders, directives, regulations, and ED
policies, identification of emerging technology and information technology service delivery
models and determination that adjustments are deemed necessary to improve its effectiveness
based upon feedback from Principal Office personnel.
Principal Office personnel including Information System Owners (ISO) and Information System
Security Officers (ISSOs) are required to manage the development, documentation, and
dissemination of system specific procedures to facilitate the implementation of the Department’s
security assessment and authorization policy and the associated controls. The ISO and ISSO shall
review security assessment and authorization procedures annually (i.e., each fiscal year) and
following the identification of evolving threats, issuance of new or significantly changed existing
Federal laws, executive orders, directives, regulations, and ED policies, identification of
emerging technology and information technology service delivery models and determination that
adjustments are deemed necessary to improve its effectiveness based upon feedback from
Principal Office personnel.

2.2 CA-2 Control Assessments (P, L, M, H and Control Overlay)


a. Select the appropriate assessor or assessment team for the type of assessment to be
conducted;
b. Develop a control assessment plan that describes the scope of the assessment including:
1. Controls and control enhancements under assessment;
2. Assessment procedures to be used to determine control effectiveness; and
3. Assessment environment, assessment team, and assessment roles and
responsibilities;
c. Ensure the control assessment plan is reviewed and approved by the Authorizing Official
(AO) or designated representative prior to conducting the assessment;
d. Assess the controls in the system and its environment of operation at least annually (i.e.,
each fiscal year) using independent assessors, self assessments or ongoing security
control monitoring/ongoing security authorization processes to determine the extent to
which the controls are implemented correctly, operating as intended, and producing the
desired outcome with respect to meeting established security and privacy requirements;
e. Produce a control assessment report that document the results of the assessment; and
f. Provide the results of the control assessment to Chief Information Security Officer
(CISO), AO, Chief Privacy Officer/Senior Agency Official for Privacy (CPO/SAOP),
ISO, and ISSO

Version 1.2 3
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Control Overlay CA-2 ED-01 (L, M, H): Assess information systems within the Department’s
FISMA inventory to determine the extent of operational risk posed to the organization and its
mission in order to be granted an Authorization to Operate (ATO) from the AO.
Control Overlay CA-2 ED-02 (L, M, H): Include non-FISMA reportable subsystems in the
assessment of the parent FISMA reportable system.
Control Overlay CA-2 ED-03 (L, M, H): Use the Cyber Security Assessment and Management
(CSAM) tool to review, assess, maintain, track and report on the status (e.g., implemented, not
implemented) of required controls (e.g., baseline controls and control overlays).
Control Overlay CA-2 ED-04 (L, M, H): Complete all required authorization documentation as
established in the Information Technology System Planning (PL) Standard prior to assessing a
system.
Control Overlay CA-2 ED-05 (L, M, H): Reuse existing FedRAMP third party assessor
organization (3PAO) reports available from the FedRAMP Program Management Office to
assess FedRAMP authorized cloud service providers
Control Overlay CA-2 ED-06 (L, M, H): Leverage FedRAMP tailored test cases specific for
FedRAMP Tailored when conducting an assessment or self-assessment of FedRAMP Tailored
Low Impact-Software as a Service (LI-SaaS) cloud service providers.
Control Overlay CA-2 ED-07 (L, M, H): Accept Inter-Agency Agreement (IAA) in lieu of
performing an assessment of ED Shared Services.

2.2.1 CA-2(1) Control Assessments | Independent Assessors (M, H)


Employ independent assessors or assessment teams to conduct control assessments.

2.2.2 CA-2(2) Control Assessments | Specialized Assessments (H)


Include as part of control assessments, annual (i.e., each fiscal year), announced, penetration
testing and other forms of security assessments to include but not be limited to the following: in-
depth monitoring; malicious user testing; vulnerability scanning; insider threat assessment;
performance/load testing.

2.3 CA-3 Information Exchange (L, M, H)


a. Approve and manage the exchange of information between the system and other systems
using interconnection security agreements (ISA); memorandum of understanding (MOU);
interagency agreements (IAA); service level agreements (SLA);
b. Document, as part of each exchange agreement, the interface characteristics, security and
privacy requirements, controls, and responsibilities for each system, and the impact level
of the information communicated; and
c. Review and update the agreements at least annually (i.e., each fiscal year).

Version 1.2 4
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

2.3.1 CA-3(6) Information Exchange | Transfer Authorizations (H)


Verify that individuals or systems transferring data between interconnecting systems have the
requisite authorizations (i.e., write permissions or privileges) prior to accepting such data.

2.4 CA-5 Plan of Action and Milestones (POA&M) (P, L, M, H and Control
Overlay)
a. Develop a plan of action and milestones for the system to document the planned
remediation actions of the organization to correct weaknesses or deficiencies noted
during the assessment of the controls and to reduce or eliminate known vulnerabilities in
the system; and
b. Update existing plan of action and milestones monthly, at minimum, based on the
findings from control assessments, independent audits or reviews, and continuous
monitoring activities.
Control Overlay CA-5 ED-01 (L, M, H): Create, monitor, manage, track and report enterprise-
level and system-level POA&Ms in CSAM in accordance with the current version of the
Department’s POA&M Standard Operating Procedures.
Control Overlay CA-5 ED-02 (L, M, H): Document a user-defined criticality in CSAM for all
new POA&Ms created and injected as well as for all open POA&M(s) in accordance with the
current version of the Department’s POA&M SOP.
Control Overlay CA-5 ED-03 (L, M, H): Receive approval from CSP vendors at the time of
authorization to inject POA&M information into CSAM; when approval is not obtained, then the
maximum CSF Risk Scorecard score will be limited.
Control Overlay CA-5 ED-04 (L, M, H): Inject FedRAMP Cloud Service Provider (CSP)
POA&M information into CSAM, when Principal Offices sponsor a Department ATO for the
CSP and direct approval from the CSP vendor to inject the CSP POA&Ms into CSAM is
received.

2.5 CA-6 Authorization (P, L, M, H and Control Overlay)


a. Assign a senior official as the AO for the system.
b. Assign a senior official as the AO for common controls available for inheritance by
organizational systems.
c. Ensure that the AO for the system, before commencing operations:
1. Accepts the use of common controls inherited by the system; and
2. Authorizes the system to operate.
d. Ensure that the AO for common controls authorizes the use of those controls for
inheritance by organizational systems.

Version 1.2 5
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

e. Update the authorizations in accordance with the terms and conditions established by the
AO.
Control Overlay CA-6 ED-01 (L, M, H): Designate the ED CIO as the defacto AO for all Ed
systems unless specifically delegated otherwise.
Control Overlay CA-6 ED-02 (L, M, H): Identify in a formal authorization memo signed by the
AO the authorization decision as defined in Appendix B: Authorization Decision. Document and
report the status of the ATO or Ongoing Security Authorization (OSA) in CSAM.
Control Overlay CA-6 ED-03 (L, M, H): Take actions required to register into the Department’s
FISMA inventory and then shut down, migrate, or authorize any information systems and
services discovered processing, storing, transmitting, or disseminating information on behalf of
the Department or Principal Operating Component (POC) without a valid ATO.
Control Overlay CA-6 ED-04 (L, M, H): Ensure the CSF Risk Scorecard maintains a score of
“0.00” for all unauthorized information systems and services operating without an ATO until the
system or service is authorized in accordance with the Department’s policies. Systems scored as
“0.00” negatively impact POC scores and are briefed to Department senior leadership at least
monthly. Score unauthorized systems/services that adhere to OCIO requirements for achieving
an ATO as a “1.00” for a safe harbor period specified by the CISO or delegate and based on
system impact levels. Based upon an assessment of risk, the respective AO may render a Denial
of Authorization decision.
Control Overlay CA-6 ED-05 (L, M, H): Based upon an assessment of risk, the respective AO
may explicitly accept the risk for the operation of the system and grant an ATO to
systems/services which are pursuing migration or authorization and are 1) registered in CSAM as
operational; 2) scheduled for assessment; and 3) are actively working to complete required
assessment and authorization processes defined within the Department’s policies, standards, and
processes.
Control Overlay CA-6 ED-06 (L, M, H): Authorize Federal Shared Services via an Inter-Agency
Agreement (IAA).

2.6 CA-7 Continuous Monitoring (P, L, M, H and Control Overlay)


Develop a system-level continuous monitoring strategy and implement continuous monitoring in
accordance with the organization-level continuous monitoring strategy that includes:
a. Establishing the following system-level metrics to be monitored: including, at minimum,
metrics defined in the current version of the IAS Information System Continuous
Monitoring (ISCM) Roadmap;
b. Establishing at least monthly for monitoring and annually (i.e., each fiscal year) for
assessment of control effectiveness or in accordance with OSA assessment schedule and
in conjunction with the Continuous Diagnostics and Mitigation (CDM) Program;

Version 1.2 6
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

c. Ongoing control assessments in accordance with the continuous monitoring strategy;


d. Ongoing monitoring of system and organization-defined metrics in accordance with the
continuous monitoring strategy;
e. Correlation and analysis of information generated by control assessments and monitoring;
f. Response actions to address results of the analysis of control assessment and monitoring
information; and
g. Reporting the security and privacy status of the system to CISO, AO, CPO/SAOP
monthly.
Control Overlay CA-7 ED-01 (L, M, H): Conduct continuous monitoring activities following the
issuance of an ATO to identify and remediate risks while monitoring changing conditions which
could potentially affect the ability to conduct core missions and business functions.
Control Overlay CA-7 ED-02 (L, M, H): Enroll all information systems, including cloud service
providers, and common control providers, into the Department Ongoing Security Authorization
(OSA) program within 90 days of satisfying the entrance criteria; see Appendix C for OSA
program entry and exit criteria. Eligible systems not enrolled with 90 days are required to track
non-compliance with a POA&M.

2.6.1 CA-7(1) Continuous Monitoring | Independent Assessment (M, H)


Employ independent assessors or assessment teams to monitor the controls in the system on an
ongoing basis.

2.6.2 CA-7(4) Continuous Monitoring | Risk Monitoring (P, L, M, H and Control


Overlay)
Ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the
following:
a. Effectiveness monitoring;
b. Compliance monitoring; and
c. Change monitoring.
Control Overlay CA-7(4) ED-01 (L, M, H): Determine adherence to established risk appetite
and tolerance, as it relates to the Department’s Enterprise Risk Management (ERM) program,
through the ED CSF Risk Scorecard ratings.
Control Overlay CA-7(4) ED-02 (L, M, H): Use results of ongoing security and privacy
assessments and monitoring using defined and proven methodologies both quantitative metrics
and qualitative risk elements to monitor cyber risk, as represented in the ED CSF Risk
Scorecard.
Control Overlay CA-7(4) ED-03 (L, M, H): Use ED CSF Risk Scorecard to evaluate adherence
to established cyber risk appetite and risk tolerance. The Department’s cybersecurity risk

Version 1.2 7
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

appetite represents the target risk profile for a system, Principal Office and the extent to which
the Department is comfortable with the accepting ongoing persistent cybersecurity risk. The risk
appetite coincides with the calculated risk level of ‘2.00’ on a scale of ‘0.00-3.00’ within the ED
CSF Risk Scorecard. Therefore, systems are expected to maintain a minimum level of ‘2.00’ as
the risk appetite while the system is operational. Systems and system stakeholders must strive for
level 3.00 by performing actions to mitigate risks and vulnerabilities.
The cyber risk tolerance represents the amount of cybersecurity risk the Department is prepared
to temporarily accept in pursuit of its mission/business. For systems operating within the
Department’s IT environment, the risk tolerance coincides with the calculated risk level of ‘1.00’
point on a scale from ‘0.00 – 3.00’ within the ED CSF Risk Scorecard. Therefore, systems may
temporarily perform down to a ‘1.00’ as mission and business necessity demand. The formal
process for cyber risk tolerance acceptance is the Department’s security authorization process for
issuing and maintaining an ATO.
Control Overlay CA-7(4) ED-04 (L, M, H): Coordinate the Department’s Cyber Risk program
with the Department’s ERM function to maintain awareness of the cyber risk of the organization.
Provide tolerance and appetite information to all levels of the organization through updates with
a frequency determined by the Governance, Risk and Policy Branch in coordination with the
Department’s ERM function.

2.7 CA-8 Penetration Testing (H and Control Overlay)


Conduct penetration testing at least annually (i.e., each fiscal year) on all FIPS 199 High impact
and HVA information systems.
Control Overlay CA-8 ED-01 (H): Ensure the penetration test methodology used for all
penetration testing performed aligns with this policy and the current version of NIST SP 800-
115: Technical Guide to Information Security Testing and Assessment.
Control Overlay CA-8 ED-02 (H): Develop a penetration test plan which describes the scope
and methodology of the testing, rules of engagement, test schedule, logistics including all
equipment, tools, and software/applications used, communication strategy, and the documents
actions taken to comply with Department requirements.
Control Overlay CA-8 ED-03 (H): Limit or prevent adverse impacts to the ED operations and
information system as a result of penetration testing performed; require all authorized penetration
testers to retain/provide evidence of the following:
a. A digital forensic image of each testing machine (this includes virtual machine images
used for remote testing) prior to the start of testing and signed attestation that all
penetration testing equipment, software and services are free from indications of
compromise at the time the forensic image was taken.
b. Results of industry standard vulnerability scans for each testing machine to determine if
any vulnerabilities exist and to verify that all patching is up-to-date and signed

Version 1.2 8
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

attestation stating its testing equipment, software and services are free from all
vulnerabilities as noted in the national vulnerability database. Any exceptions are noted
and the reasoning as to why the vulnerability cannot be addressed.
c. Description of antivirus software installed on each testing machine and verification that
it is up to date with the most recent definitions.
d. The Federal Information Processing Standards certification numbers identifying the
encryption standards used on each testing machine for all encryption.
e. When assessors are furnished with ED government furnished equipment and services
(GFES) deployed with the Department authorized Virtual Private Network (VPN)
software, only the GFES may be used to establish a “tunnel” to access the Department’s
network for any non-government furnished equipment (non-GFES) testing machines.
f. When drone virtual machines are used to conduct remote assessments, the drones will be
configured to make use of a secure outbound connection to the internet. The connection
is established via FIPS-140-2/3 validated (certificate provided as noted in “d”) Public
Key infrastructure with an AES256 cypher being used. PKI connection keys must be
established by or provided to ED SOC for appropriate monitoring and analysis of the
encrypted traffic.
Control Overlay CA-8 ED-04 (H): Limit the use of whitelisting of testing equipment; when it is
required to conduct testing of specific development environments, whitelisting should be
documented and restricted to a specific target range of internet protocol and system access.
Control Overlay CA-8 ED-05 (H): Ensure the AO or designated representative reviews and
approves the penetration test plan, including the rules of engagement, prior to initiating any
penetration testing activities.

2.7.1 CA-8(1) Penetration Testing | Independent Penetration Testing Agent or Team (H


and Control Overlay)
Employ an independent penetration testing agent or team to perform penetration testing on the
system or system components.
Control Overlay CA-8(1) ED-01 (H): Enable and support penetration testing performed by
DHS.

2.8 CA-9 Internal System Connections (L, M, H)


a. Authorize internal connections of all components or classes of components to the system.
b. Document, for each internal connection, the interface characteristics, security and privacy
requirements, and the nature of the information communicated.
c. Terminate internal system connections after determining it no longer provides support for
organizational missions or business functions or when conditions meet one or more of the

Version 1.2 9
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

following: (1) zero trust architecture standards, guidance, and memorandums from
Cybersecurity and Infrastructure Security Agency (CISA), Office of Management and
Budget (OMB) or NIST; (2) targeted responses to certain types of incidents; 3) time-of-
day restrictions on system use, if implemented; or 4) thirty (30) minutes of session
inactivity. System-level activities, established by a virtual private network (VPN)
connection, are authorized to continue after strict user interactions have ended to support
remote system patching; and
d. Review at least annually (i.e., each fiscal year) the continued need for each internal
connection.
3 RISK ACCEPTANCE/POLICY EXCEPTIONS
Deviations from the Department policies, Instructions, Standards, Procedures or Memos must be
approved and documented through the Department’s Risk Acceptance process. Deviations that
introduce additional risks to the enterprise must be submitted through the Department Risk
Acceptance Form (RAF) and must be approved by the ED CISO (as delegated). Requests must
justify the reason for the deviation(s)/exception(s) as well as the compensating security controls
implemented to secure the device or information, if applicable. Policy deviations that do not
introduce additional risks do not need to be submitted through the Department RAF but will need to
be approved by the Department CISO (as delegated).

Version 1.2 10
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

4 ACRONYMS

3PAO FedRAMP Third Party Assessor Organization


ACS Administrative Communication System
AO Authorizing Official
ATO Authorization to Operate
CDM Continuous Diagnostics and Mitigation
CIO Chief Information Officer
CISA Cybersecurity and Infrastructure Security Agency
CISO Chief Information Security Officer
CPO Chief Privacy Officer
CSAM Cyber Security Assessment and Management tool
CSP Cloud Service Provider
DHS Department of Homeland Security
ED Department of Education
ERM Enterprise Risk Management
FedRAMP Federal Risk and Authorization Management Program
FIPS Federal Information Processing Standard
FISMA Federal Information Security Modernization Act
GFES Government Furnished Equipment or Services
HVA High Value Asset
IAA Inter Agency Agreement
IAS Information Assurance Services
ISA Interconnection Security Agreement
ISCM Information System Continuous Monitoring
ISO Information System Owner
ISSM Information System Security Manager
ISSO Information Systems Security Officer
IT Information Technology
LI-SaaS Low Impact-Software as a Service

Version 1.2 11
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

MOU Memorandum of Understanding


NIST National Institute of Standards and Technology
OMB Office of Management and Budget
OSA Ongoing Security Authorization
PO Principal Office
POA&M Plan of Action & Milestones
RAF Risk Acceptance Form
SAOP Senior Agency Official for Privacy
SLA Service Level Agreement
SSP System Security Plan
VPN Virtual Private Network

Version 1.2 12
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

5 APPENDIX A - BASELINE CONTROL PARAMETER SUMMARY


The applicability for each baseline control parameter is shown below. NIST SP 800-53 controls
that are not applicable to any control baseline are shaded in gray.
Security Security Security
CSF and CSF and
Control Privacy Control Control Control
Control/Control Enhancement Name Privacy Privacy
Identifier Baseline Baseline Baseline Baseline
Category Subcategory
Low Moderate High
CA-1 Policy and Procedures x x x x DE.DP, DE.DP-2,
RS.AN RS.AN-5

CA-2 Control Assessments x x x x ID.RA, ID.RA-1,


ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.DP, PR.IP-7,
RS.AN, DE.DP-1,
RS.MI, DE.DP-2,
ID.DE-P, DE.DP-3,
GV.MT-P, DE.DP-4,
CT.DM-P, DE.DP-5,
PR.PO-P RS.AN-5,
RS.MI-3,
ID.DE-P5,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5
CA-2(1) Control Assessments | Independent x x ID.RA, ID.RA-1,
Assessors ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.DP, PR.IP-7,
RS.AN, DE.DP-1,
RS.MI, DE.DP-2,
ID.DE-P, DE.DP-3,
GV.MT-P, DE.DP-4,
CT.DM-P, DE.DP-5,
PR.PO-P RS.AN-5,
RS.MI-3,
ID.DE-P5,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5
CA-2(2) Control Assessments | Specialized x ID.RA, ID.RA-1,
Assessments ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.DP, PR.IP-7,
RS.AN, DE.DP-1,
RS.MI, DE.DP-2,
ID.DE-P, DE.DP-3,
GV.MT-P, DE.DP-4,
CT.DM-P, DE.DP-5,
PR.PO-P RS.AN-5,
RS.MI-3,
ID.DE-P5,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5

Version 1.2 13
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Security Security Security


CSF and CSF and
Control Privacy Control Control Control
Control/Control Enhancement Name Privacy Privacy
Identifier Baseline Baseline Baseline Baseline
Category Subcategory
Low Moderate High
CA-2(3) Control Assessments | Leveraging Results ID.RA, ID.RA-1,
from External Organizations ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.DP, PR.IP-7,
RS.AN, DE.DP-1,
RS.MI, DE.DP-2,
ID.DE-P, DE.DP-3,
GV.MT-P, DE.DP-4,
CT.DM-P, DE.DP-5,
PR.PO-P RS.AN-5,
RS.MI-3,
ID.DE-P5,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5
CA-3 Information Exchange x x x ID.AM, ID.AM-3,
DE.AE DE.AE-1

CA-3(6) Information Exchange | Transfer x ID.AM, ID.AM-3,


Authorizations DE.AE DE.AE-1

CA-3(7) Information Exchange | Transitive ID.AM, ID.AM-3,


Information Exchanges DE.AE DE.AE-1

CA-5 Plan of Action and Milestones x x x x ID.RA, ID.RA-1,


ID.RA-P, ID.RA-6,
GV.MT-P ID.RA-P5,
GV.MT-P4

CA-5(1) Plan of Action and Milestones | Automation ID.RA, ID.RA-1,


Support for Accuracy and Currency ID.RA-P, ID.RA-6,
GV.MT-P ID.RA-P5,
GV.MT-P4

CA-6 Authorization x x x x ID.RM. ID.RM-1,


ID.GV ID.GV-2

Version 1.2 14
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Security Security Security


CSF and CSF and
Control Privacy Control Control Control
Control/Control Enhancement Name Privacy Privacy
Identifier Baseline Baseline Baseline Baseline
Category Subcategory
Low Moderate High
CA-6(1) Authorization | Joint Authorization — Intra-
organization

CA-6(2) Authorization | Joint Authorization — Inter-


organization

CA-7 Continuous Monitoring x x x x ID.RA, ID.RA-1,


ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.AE, PR.IP-7,
DE.CM, PR.IP-8,
DE.DP, DE.AE-2,
RS.AN, DE.AE-3,
RS.MI, DE.CM-1,
ID.DE-P, DE.CM-2,
GV.MT-P, DE.CM-3,
CT.DM-P, DE.CM-6,
PR.PO-P DE.CM-7,
DE.DP-1,
DE.DP-2,
DE.DP-3,
DE.DP-4,
DE.DP-5,
RS.AN-1,
RS.MI-3,
ID.DE-P5,
GV.MT-P1,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5,
PR.PO-P6
CA-7(1) Continuous Monitoring | Independent x x ID.RA, ID.RA-1,
Assessment ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.AE, PR.IP-7,
DE.CM, PR.IP-8,
DE.DP, DE.AE-2,
RS.AN, DE.AE-3,
RS.MI, DE.CM-1,
ID.DE-P, DE.CM-2,
GV.MT-P, DE.CM-3,
CT.DM-P, DE.CM-6,
PR.PO-P DE.CM-7,
DE.DP-1,
DE.DP-2,
DE.DP-3,
DE.DP-4,
DE.DP-5,
RS.AN-1,
RS.MI-3,

Version 1.2 15
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Security Security Security


CSF and CSF and
Control Privacy Control Control Control
Control/Control Enhancement Name Privacy Privacy
Identifier Baseline Baseline Baseline Baseline
Category Subcategory
Low Moderate High
ID.DE-P5,
GV.MT-P1,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5,
PR.PO-P6

CA-7(3) Continuous Monitoring | Trend Analyses ID.RA, ID.RA-1,


ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.AE, PR.IP-7,
DE.CM, PR.IP-8,
DE.DP, DE.AE-2,
RS.AN, DE.AE-3,
RS.MI, DE.CM-1,
ID.DE-P, DE.CM-2,
GV.MT-P, DE.CM-3,
CT.DM-P, DE.CM-6,
PR.PO-P DE.CM-7,
DE.DP-1,
DE.DP-2,
DE.DP-3,
DE.DP-4,
DE.DP-5,
RS.AN-1,
RS.MI-3,
ID.DE-P5,
GV.MT-P1,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5,
PR.PO-P6
CA-7(4) Continuous Monitoring | Risk Monitoring x x x x ID.RA, ID.RA-1,
ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.AE, PR.IP-7,
DE.CM, PR.IP-8,
DE.DP, DE.AE-2,
RS.AN, DE.AE-3,
RS.MI, DE.CM-1,
ID.DE-P, DE.CM-2,
GV.MT-P, DE.CM-3,
CT.DM-P, DE.CM-6,
PR.PO-P DE.CM-7,
DE.DP-1,
DE.DP-2,
DE.DP-3,
DE.DP-4,
DE.DP-5,
RS.AN-1,
RS.MI-3,
ID.DE-P5,
GV.MT-P1,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5,
PR.PO-P6

Version 1.2 16
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Security Security Security


CSF and CSF and
Control Privacy Control Control Control
Control/Control Enhancement Name Privacy Privacy
Identifier Baseline Baseline Baseline Baseline
Category Subcategory
Low Moderate High
CA-7(5) Continuous Monitoring | Consistency ID.RA, ID.RA-1,
Analysis ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.AE, PR.IP-7,
DE.CM, PR.IP-8,
DE.DP, DE.AE-2,
RS.AN, DE.AE-3,
RS.MI, DE.CM-1,
ID.DE-P, DE.CM-2,
GV.MT-P, DE.CM-3,
CT.DM-P, DE.CM-6,
PR.PO-P DE.CM-7,
DE.DP-1,
DE.DP-2,
DE.DP-3,
DE.DP-4,
DE.DP-5,
RS.AN-1,
RS.MI-3,
ID.DE-P5,
GV.MT-P1,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5,
PR.PO-P6
CA-7(6) Continuous Monitoring | Automation ID.RA, ID.RA-1,
Support for Monitoring ID.SC, ID.RA-5,
PR.IP, ID.SC-4,
DE.AE, PR.IP-7,
DE.CM, PR.IP-8,
DE.DP, DE.AE-2,
RS.AN, DE.AE-3,
RS.MI, DE.CM-1,
ID.DE-P, DE.CM-2,
GV.MT-P, DE.CM-3,
CT.DM-P, DE.CM-6,
PR.PO-P DE.CM-7,
DE.DP-1,
DE.DP-2,
DE.DP-3,
DE.DP-4,
DE.DP-5,
RS.AN-1,
RS.MI-3,
ID.DE-P5,
GV.MT-P1,
GV.MT-P3,
CT.DM-P9,
PR.PO-P5,
PR.PO-P6
CA-8 Penetration Testing x ID.RA, ID.RA-1,
PR.IP, PR.IP-7,
PR.PO-P PR.PO-P5

Version 1.2 17
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Security Security Security


CSF and CSF and
Control Privacy Control Control Control
Control/Control Enhancement Name Privacy Privacy
Identifier Baseline Baseline Baseline Baseline
Category Subcategory
Low Moderate High
CA-8(1) Penetration Testing | Independent x ID.RA, ID.RA-1,
Penetration Testing Agent or Team PR.IP, PR.IP-7,
PR.PO-P PR.PO-P5

CA-8(2) Penetration Testing | Red Team Exercises ID.RA, ID.RA-1,


PR.IP, PR.IP-7,
PR.PO-P PR.PO-P5

CA-8(3) Penetration Testing | Facility Penetration ID.RA, ID.RA-1,


Testing PR.IP, PR.IP-7,
PR.PO-P PR.PO-P5

CA-9 Internal System Connections x x x ID.AM ID.AM-3

CA-9(1) Internal System Connections | Compliance ID.AM ID.AM-3


Checks

Version 1.2 18
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

6 APPENDIX B - AUTHORIZATION DECISION


The explicit acceptance of risk is the responsibility of the designated AO and cannot be further
delegated to other officials. The AO must consider many factors (e.g., security, privacy and
supply chain) when deciding if the risk to the Principal Office and Department operations
(including mission, functions, image, and reputation) and assets, individuals, other organizations,
or the Nation, is acceptable. Balancing security and privacy considerations with mission and
business needs is paramount to achieving an acceptable risk-based authorization decision. Risks
identified through risk assessments (both initial and ongoing) and continuous monitoring, must
be catalogued and tracked in CSAM as POA&Ms.
The respective AO must review the authorization boundary, security categorization results and
decision, System Security Plan (SSP), assessment out briefs and reports, authorization package
and POA&Ms, and determine whether the identified risks need to be mitigated prior to
authorization. The AO should consult with the ISO, ISSO, and security and privacy control
assessors and gain input from the Department’s CISO and SAOP prior to making the final
authorization decision. The authorization decision shall be clearly identified in a formal
authorization memorandum that is signed by the AO. Authorization decisions resulting from the
risk assessment process shall be conveyed to the ISO and ISSO. Types of authorization decisions
for ED systems and common control providers are detailed in the table below.
Authorization
Description
Decision
Authorization to Operate Issued after an AO has determined the risk to Department operations and
(ATO) assets, individuals, other organizations, and the nation is acceptable. An
ATO is issued for a specified period in accordance with the terms and
conditions established by the AO. An authorization termination date is
established by the AO as a condition of the ATO to indicate when the ATO
expires. The authorization termination date may be adjusted at any time by
the AO to reflect an increased level of concern regarding the security and
privacy posture of the system. The AO may choose to include operating
restrictions such as limiting logical and physical access to a minimum
number of users; restricting system use time periods; employing enhanced or
increased audit logging, scanning, and monitoring; or restricting the system
functionality to include only the functions that require live testing. The AO
considers results from the assessment of controls that are fully or partially
implemented. Additionally, an adverse event could occur that triggers the
need to review the authorization to operate. This includes major system
changes and security posture impacts analyzed and reported through risk
scoring as identified ongoing information security continuous monitoring
(ISCM) activities.
Denial of Authorization Issued for an information system in which the AO has determined the risk to
(DATO) Department operations (including image & reputation) and assets,
individuals, and other organization is at an unacceptable level after

Version 1.2 19
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

Authorization
Description
Decision
reviewing the risk assessment and authorization package and any additional
inputs provided. This means that the information system is not authorized to
operate and cannot be placed into operation within the Department’s
operating environment. If the system is currently in operation, all activity is
halted. A Denial of Authorization indicates that there are major weaknesses
or deficiencies in the security controls employed within or inherited by the
information system.

Version 1.2 20
Information Technology (IT) System Security Assessment and Authorization (CA) Standard

7 APPENDIX C - ONGOING SECURITY AUTHORIZATION CRITERIA


The OSA entrance criteria conditions in table below must be satisfied to enter into the
Department’s OSA program. The OSA Exit Criteria events are triggers that may result in a
system’s unenrollment from the OSA program.

OSA ENTRANCE CRITERIA


Event Description
ATO Granted An independent assessment of risk or Full Scope security
assessment has been completed, the Initial Authorization granted,
and the ATO date is at least 3 months in the past
OR
A system with an existing ATO must have more than 18 months
remaining on its current ATO

OSA EXIT CRITERIA


Event Description
Past Due POA&Ms Past Due POA&M risk factor score is less than a three (3) in the
system level CSF Scorecard
CSF Risk Scorecard Overall Overall Score < 2, which is below the established Department
Score Risk Appetite

Secure Baseline Configuration Remediation of non-compliant secure baseline configuration


(STIG) Compliance findings not completed within two weeks of OSA entrance or
OSA assessment remediation period
Critical and High All identified critical and high vulnerabilities have not been
Vulnerabilities remediated within the Department’s established timelines in
accordance with Information Technology (IT) System Risk
Assessment (RA) Standard
Significant System Change If significant system changes occurs, including planned or
unplanned major upgrades or system migration
System information is System is identified on the CSAM Data Discrepancies report for
inaccurate and/or outdated in inaccuracies or missing information
CSAM

Version 1.2 21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy