BRACKETOLOGY | FEDRAMP
CA-6: SECURITY AUTHORIZATION
-
FedRAMP Baseline Membership CA-6:
- LOW
- MODERATE
- HIGH
FedRAMP Bracketology
Use the FedRAMP Control Membership information above to determine if a control or control enhancement is required for each Impact Baseline — LOW, MODERATE, or HIGH
Click on the panel below each control or control enhancement to review the FedRAMP Impact Baseline-specific control configuration requirements for each of the [BRACKETS] in each control and/or control enhancement.
Review and use Additional Requirements and Guidance to build FedRAMP-compliant controls for your risk-based cybersecurity program.
To change the baseline view in the panel, click on LOW, MODERATE, or HIGH when the panel is open
Panels only appear where there are [BRACKETS] in the control or enhancement or where there is FedRAMP-specific requirements or guidance available.
The organization:
- a. Assigns a senior-level executive or manager as the authorizing official for the information system;
- b. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
- c. Updates the security authorization [Assignment: organization-defined frequency].
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
- a. Assigns a senior-level executive or manager as the authorizing official for the information system;
- b. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
- c. Updates the security authorization in accordance with OMB A-130 requirements or when a significant change occurs.
FedRAMP GUIDANCE:
Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
- a. Assigns a senior-level executive or manager as the authorizing official for the information system;
- b. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
- c. Updates the security authorization in accordance with OMB A-130 requirements or when a significant change occurs.
FedRAMP GUIDANCE:
Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
- a. Assigns a senior-level executive or manager as the authorizing official for the information system;
- b. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
- c. Updates the security authorization in accordance with OMB A-130 requirements or when a significant change occurs.
FedRAMP GUIDANCE:
Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
SUPPLEMENTAL GUIDANCE
Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.
RELATED CONTROLS: CA-6
CONTROL ENHANCEMENTS
NO CONTROL ENHANCEMENTS
REFERENCES:
- NIST Special Publication 800-137
- NIST Special Publication 800-37
- OMB Circular A-130
- OMB Memorandum 11-33