CA-01 Certification, Accreditation, And Security Assessment Policies And Procedures

Security Assessment and Authorization

Low Moderate High Privacy

Description

The organization develops, disseminates, and periodically reviews/updates: (i) formal, documented, security assessment and certification and accreditation policies that address purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the security assessment and certification and accreditation policies and associated assessment, certification, and accreditation controls.\n

Supplemental Guidance

The security assessment and certification and accreditation policies and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The security assessment and certification and accreditation policies can be included as part of the general information security policy for the organization. Security assessment and certification and accreditation procedures can be developed for the security program in general, and for a particular information system, when required. The organization defines what constitutes a significant change to the information system to achieve consistent security reaccreditations. NIST Special Publication 800-53A provides guidance on security control assessments. NIST Special Publication 800-37 provides guidance on security certification and accreditation. NIST Special Publication 800-12 provides guidance on security policies and procedures.\n

Changes from Rev 4

Title changed from 'Security Assessment and Authorization Policies and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level assessment, authorization, and monitoring policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures New parameters include need to update policy and procedures after specified events in additional to specified frequency Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance

Enhancements

(0) None.\n

Compliance Mappings

ISO 27001:2022

5.1(a)5.25.2(a)5.2(b)5.2(c)5.2(d)5.2(e)5.2(f)5.2(g)7.57.5.17.5.1(a)7.5.1(b)7.5.27.5.2(a)7.5.2(b)7.5.2(c)7.5.37.5.3(a)7.5.3(b)7.5.3(c)7.5.3(d)7.5.3(e)7.5.3(f)

ISO 27002:2022

5.15.215.37

COBIT 2019

APO01.09APO02.02APO13.03BAI03.08EDM01.01EDM01.03EDM05.01

NIST CSF 2.0

GV.OVGV.OV-01GV.OV-02GV.POGV.PO-01GV.PO-02GV.SC-01GV.SC-03ID.RAID.RA-01

SOC 2 TSC

CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC4.1CC4.1-POF8CC5.3CC5.3-POF1CC5.3-POF6CC6.1-POF2CC6.1-POF9CC7.2-POF1P1.1-POF5

ISO 17799 (legacy)

6.1.410.3.215.1.1

COBIT 4.1 (legacy)

PO10.12PC5