BRACKETOLOGY | FEDRAMP
PS-7: THIRD-PARTY PERSONNEL SECURITY
-
FedRAMP Baseline Membership PS-7:
- LOW
- MODERATE
- HIGH
FedRAMP Bracketology
Use the FedRAMP Control Membership information above to determine if a control or control enhancement is required for each Impact Baseline — LOW, MODERATE, or HIGH
Click on the panel below each control or control enhancement to review the FedRAMP Impact Baseline-specific control configuration requirements for each of the [BRACKETS] in each control and/or control enhancement.
Review and use Additional Requirements and Guidance to build FedRAMP-compliant controls for your risk-based cybersecurity program.
To change the baseline view in the panel, click on LOW, MODERATE, or HIGH when the panel is open
Panels only appear where there are [BRACKETS] in the control or enhancement or where there is FedRAMP-specific requirements or guidance available.
The organization:
- a. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
- b. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
- c. Documents personnel security requirements;
- d. Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [Assignment: organization-defined time period]; and
- e. Monitors provider compliance.
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
The organization:
- a. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
- b. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
- c. Documents personnel security requirements;
- d. Requires third-party providers to notify : organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within same day; and
- e. Monitors provider compliance.
The organization:
- a. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
- b. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
- c. Documents personnel security requirements;
- d. Requires third-party providers to notify : organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within same day; and
- e. Monitors provider compliance.
The organization:
- a. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
- b. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
- c. Documents personnel security requirements;
- d. Requires third-party providers to notify : organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within terminations: immediately; transfers: within twenty-four (24) hours; and
- e. Monitors provider compliance.
SUPPLEMENTAL GUIDANCE
Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials/privileges associated with individuals transferred or terminated.
RELATED CONTROLS: PS-7
CONTROL ENHANCEMENTS
NO CONTROL ENHANCEMENTS
REFERENCES:
- NIST Special Publication 800-35