ARTIFACTS

CP: CONTINGENCY PLANNING

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for Contingency Planning (CP); and documents that are widely used in the assessment of controls and control enhancements in the Contingency Planning (CP) Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR CONTINGENCY PLANNING (CP)
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Contingency Planning (CP) policy
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
ACCESS CONTROL POLICY & PROCEDURES (AC)
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of Contingency Planning (CP) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
Contingency planning POLICY & PROCEDURES CP-1
Procedures addressing alternate telecommunications services CP-8 (5)
Procedures addressing primary and alternate telecommunications services CP-8 (3)
Procedures addressing alternate processing sites CP-7
CP-7 (1)
CP-7 (2)
CP-7 (3)
CP-7 (4)
CP-7 (6)
Procedures addressing alternate security mechanisms CP-13
Procedures addressing alternate storage sites CP-6
CP-6 (1)
CP-6 (2)
CP-6 (3)
Procedures addressing alternate telecommunications services CP-8
Procedures addressing alternative communications protocols CP-11
Procedures addressing contingency operations for the information system CP-2
CP-2 (1)
CP-2 (2)
CP-2 (3)
CP-2 (4)
CP-2 (5)
CP-2 (6)
CP-2 (7)
CP-2 (8)
Procedures addressing contingency plan testing CP-4
CP-4 (1)
CP-4 (2)
CP-4 (3)
Procedures addressing contingency training CP-3
CP-3 (1)
CP-3 (2)
Procedures addressing information system backup CP-9
CP-9 (1)
CP-9 (2)
CP-9 (3)
CP-9 (5)
CP-9 (6)
CP-9 (7)
CP-10
Procedures addressing information system recovery and reconstitution CP-4 (4)
CP-10 (2)
CP-10 (4)
CP-10 (6)
Procedures addressing primary and alternate telecommunications services CP-8 (1)
CP-8 (2)
CP-8 (4)
Procedures addressing safe mode of operation for the information system CP-12

Evidence, Records & Artifacts

Here you'll find a catalog of Contingency Planning (CP) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Alternate processing site CP-7 (1)
CP-7 (2)
CP-7 (4)
CP-7 (6)
Alternate processing site agreements CP-2 (5)
CP-2 (6)
CP-4 (2)
CP-7
CP-7 (1)
CP-7 (2)
CP-7 (3)
CP-7 (4)
CP-7 (6)
CP-7 (4)
CP-7 (6)
Alternate processing site configurations CP-7 (4)
CP-7 (6)
Alternate storage site CP-6 (1)
CP-6 (2)
CP-6 (3)
Alternate storage site agreements CP-2 (5)
CP-2 (6)
CP-6
CP-6 (1)
CP-6 (2)
CP-9 (5)
Alternate storage site configurations CP-6 (2)
Alternate telecommunications service agreements CP-8 (5)
Alternate telecommunications service provider site CP-8 (3)
Automated mechanisms supporting contingency plan testing CP-4 (3)
Backup storage location(s) CP-9 (3)
Business impact assessment CP-2 (3)
CP-2 (4)
CP-2 (5)
CP-2 (6)
CP-2 (8)
Capacity planning documents CP-2 (2)
Contingency plan requirements CP-2 (7)
Contingency plan test documentation CP-2 (5)
CP-4
CP-4 (2)
CP-4 (3)
CP-4 (4)
CP-9 (1)
CP-9 (2)
CP-9 (6)
CP-10
CP-10 (2)
CP-10 (4)
Contingency plan test records CP-12
CP-13
Contingency plan test results CP-2 (5)
CP-2 (6)
CP-4
CP-4 (2)
CP-4 (3)
CP-4 (4)
CP-9 (1)
CP-9 (2)
CP-9 (6)
CP-10
CP-10 (2)
CP-10 (4)
CP-13
Contingency plan testing documentation CP-2 (6)
CP-4 (1)
Contingency plans of external service providers CP-2 (7)
Contingency training curriculum CP-3
CP-3 (1)
CP-3 (2)
Contingency training material CP-3
CP-3 (1)
CP-3 (2)
Contingency training records CP-3
Equipment and supply contracts CP-7
Evidence of contingency plan reviews and updates CP-2
Evidence of contingency testing/training by providers CP-8 (4)
Evidence of information system recovery and reconstitution operations CP-10 (4)
Evidence of system backup information transferred to alternate storage site CP-9 (5)
Evidence of testing alternate telecommunications services CP-8 (5)
Incident handling records CP-12
Incident response policy CP-4 (1)
Information system administration manuals CP-12
Information system audit records CP-10 (2) CP-12
Information system backup configurations and associated documentation CP-9 (3)
Information system backup logs or records CP-9
CP-9 (3)
CP-9 (5)
Information system backup test results CP-9 (1)
CP-9 (2)
CP-9 (6)
CP-10
Information system installation manuals CP-12
Information system operation manuals CP-12
Information system transaction recovery records CP-10 (2)
Location(s) of redundant secondary backup system(s) CP-9 (6)
CP-10
Logical access authorization records CP-10 (6)
Logical access credentials CP-10 (6)
Logs or records of deletion or destruction of backup information CP-9 (7)
Mitigation actions for accessibility problems to alternate storage site CP-6 (3)
Organizational risk assessments CP-6 (3)
Physical access authorization records CP-10 (6)
Physical access credentials CP-10 (6)
Primary and alternate telecommunications service agreements CP-8
CP-8 (1)
CP-8 (2)
CP-8 (3)
CP-8 (4)
Primary processing site agreements CP-2 (5)
CP-7
CP-7 (1)
CP-7 (2)
Primary storage site agreements CP-2 (5)
CP-6
CP-6 (1)
Primary telecommunications service provider site CP-8 (3)
Redundant secondary system for information system backups CP-9 (6)
Redundant secondary system for information system backups CP-10
Service level agreements CP-2 (7)
CP-4 (2)
CP-7
CP-7 (3)
Spare equipment and supplies inventory at alternate processing site CP-7
System generated list of dual authorization credentials or rules CP-9 (7)
Telecommunications Service Priority documentation CP-8 (1)

Contingency Planning Related Lists

These are the Contingency Planning (CP) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
List of alternative communications protocols supporting continuity of operations CP-11
List of potential accessibility problems to alternate storage site CP-6 (3)
Go to The List of Lists