BRACKETOLOGY | FEDRAMP
CA-3: SYSTEM INTERCONNECTIONS
-
FedRAMP Baseline Membership CA-3:
- LOW
- MODERATE
- HIGH
FedRAMP Bracketology
Use the FedRAMP Control Membership information above to determine if a control or control enhancement is required for each Impact Baseline — LOW, MODERATE, or HIGH
Click on the panel below each control or control enhancement to review the FedRAMP Impact Baseline-specific control configuration requirements for each of the [BRACKETS] in each control and/or control enhancement.
Review and use Additional Requirements and Guidance to build FedRAMP-compliant controls for your risk-based cybersecurity program.
To change the baseline view in the panel, click on LOW, MODERATE, or HIGH when the panel is open
Panels only appear where there are [BRACKETS] in the control or enhancement or where there is FedRAMP-specific requirements or guidance available.
The organization:
- a. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
- b. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
- c. Reviews and updates Interconnection Security Agreements [Assignment: organization-defined frequency].
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
- a. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
- b. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
- c. Reviews and updates Interconnection Security Agreements at least annually and on input from FedRAMP.
- a. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
- b. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
- c. Reviews and updates Interconnection Security Agreements at least annually and on input from FedRAMP.
- a. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
- b. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
- c. Reviews and updates Interconnection Security Agreements at least annually and on input from FedRAMP.
SUPPLEMENTAL GUIDANCE
This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.
RELATED CONTROLS: CA-3
CONTROL ENHANCEMENTS
CA-3 (1) SYSTEM INTERCONNECTIONS | UNCLASSIFIED NATIONAL SECURITY SYSTEM CONNECTIONS
The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].
Supplemental Guidance:
Organizations typically do not have control over external networks (e.g., the Internet). Approved boundary protection devices (e.g., routers, firewalls) mediate communications (i.e., information flows) between unclassified national security systems and external networks. This control enhancement is required for organizations processing, storing, or transmitting Controlled Unclassified Information (CUI).
CA-3 (2) SYSTEM INTERCONNECTIONS | CLASSIFIED NATIONAL SECURITY SYSTEM CONNECTIONS
The organization prohibits the direct connection of a classified, national security system to an external network without the use of [Assignment: organization-defined boundary protection device].
Supplemental Guidance:
Organizations typically do not have control over external networks (e.g., the Internet). Approved boundary protection devices (e.g., routers, firewalls) mediate communications (i.e., information flows) between classified national security systems and external networks. In addition, approved boundary protection devices (typically managed interface/cross-domain systems) provide information flow enforcement from information systems to external networks.
CA-3 (3) SYSTEM INTERCONNECTIONS | UNCLASSIFIED NON-NATIONAL SECURITY SYSTEM CONNECTIONS
-
FedRAMP Baseline Membership CA-3 (3):
- MODERATE
- HIGH
The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a LOW Impact system.
The organization prohibits the direct connection of an organization-defined unclassified, non-national security system to an external network without the use of boundary protections which meet Trusted Internet Connection (TIC) requirements.
FedRAMP GUIDANCE:
Refer to Appendix H Cloud Considerations of the TIC 2.0 Reference Architecture document. Link: https://www.fedramp.gov/files/2015/04/TIC_Ref_Arch_v2-0_2013.pdf
The organization prohibits the direct connection of an organization-defined unclassified, non-national security system to an external network without the use of boundary protections which meet Trusted Internet Connection (TIC) requirements.
FedRAMP GUIDANCE:
Refer to Appendix H Cloud Considerations of the TIC 2.0 Reference Architecture document. Link: https://www.fedramp.gov/files/2015/04/TIC_Ref_Arch_v2-0_2013.pdf
Supplemental Guidance:
Organizations typically do not have control over external networks (e.g., the Internet). Approved boundary protection devices (e.g., routers, firewalls) mediate communications (i.e., information flows) between unclassified non-national security systems and external networks. This control enhancement is required for organizations processing, storing, or transmitting Controlled Unclassified Information (CUI).
CA-3 (4) SYSTEM INTERCONNECTIONS | CONNECTIONS TO PUBLIC NETWORKS
The organization prohibits the direct connection of an [Assignment: organization-defined information system] to a public network.
Supplemental Guidance:
A public network is any network accessible to the general public including, for example, the Internet and organizational extranets with public access.
CA-3 (5) SYSTEM INTERCONNECTIONS | RESTRICTIONS ON EXTERNAL SYSTEM CONNECTIONS
-
FedRAMP Baseline Membership CA-3 (5):
- MODERATE
- HIGH
The organization employs [Selection: allow-all, deny-by-exception; deny-all, permit-by-exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a LOW Impact system.
There are no FedRAMP-specific BRACKET requirements if this control is used for a MODERATE Impact system.
FedRAMP GUIDANCE:
For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing.
The organization employs deny-all, permit-by-exception policy for allowing any systems to connect to external information systems.
FedRAMP GUIDANCE:
For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing.
Supplemental Guidance:
Organizations can constrain information system connectivity to external domains (e.g., websites) by employing one of two policies with regard to such connectivity: (i) allow-all, deny by exception, also known as blacklisting (the weaker of the two policies); or (ii) deny-all, allow by exception, also known as whitelisting (the stronger of the two policies). For either policy, organizations determine what exceptions, if any, are acceptable.
RELATED CONTROLS: CA-3 (5)
REFERENCES:
- FIPS Publication 199
- NIST Special Publication 800-47