BRACKETOLOGY | FEDRAMP
PE-5: ACCESS CONTROL FOR OUTPUT DEVICES
-
FedRAMP Baseline Membership PE-5:
- MODERATE
- HIGH
FedRAMP Bracketology
Use the FedRAMP Control Membership information above to determine if a control or control enhancement is required for each Impact Baseline — LOW, MODERATE, or HIGH
Click on the panel below each control or control enhancement to review the FedRAMP Impact Baseline-specific control configuration requirements for each of the [BRACKETS] in each control and/or control enhancement.
Review and use Additional Requirements and Guidance to build FedRAMP-compliant controls for your risk-based cybersecurity program.
To change the baseline view in the panel, click on LOW, MODERATE, or HIGH when the panel is open
Panels only appear where there are [BRACKETS] in the control or enhancement or where there is FedRAMP-specific requirements or guidance available.
The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
SUPPLEMENTAL GUIDANCE
Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.
RELATED CONTROLS: PE-5
CONTROL ENHANCEMENTS
PE-5 (1) ACCESS CONTROL FOR OUTPUT DEVICES
The organization:
- (a) Controls physical access to output from [Assignment: organization-defined output devices]; and
- (b) Ensures that only authorized individuals receive output from the device.
Supplemental Guidance:
Controlling physical access to selected output devices includes, for example, placing printers, copiers, and facsimile machines in controlled areas with keypad access controls or limiting access to individuals with certain types of badges.
PE-5 (2) ACCESS CONTROL FOR OUTPUT DEVICES | ACCESS TO OUTPUT BY INDIVIDUAL IDENTITY
The information system:
- (a) Controls physical access to output from [Assignment: organization-defined output devices]; and
- (b) Links individual identity to receipt of the output from the device.
Supplemental Guidance:
Controlling physical access to selected output devices includes, for example, installing security functionality on printers, copiers, and facsimile machines that allows organizations to implement authentication (e.g., using a PIN or hardware token) on output devices prior to the release of output to individuals.
PE-5 (3) ACCESS CONTROL FOR OUTPUT DEVICES | MARKING OUTPUT DEVICES
The organization marks [Assignment: organization-defined information system output devices] indicating the appropriate security marking of the information permitted to be output from the device.
Supplemental Guidance:
Outputs devices include, for example, printers, monitors, facsimile machines, scanners, copiers, and audio devices. This control enhancement is generally applicable to information system output devices other than mobiles devices.
REFERENCES:
- NO REFERENCES