ARTIFACTS

MP: MEDIA PROTECTION

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for Media Protection (MP); and documents that are widely used in the assessment of controls and control enhancements in the Media Protection (MP) family. Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR MEDIA PROTECTION
MEDIA PROTECTION POLICY & PROCEDURES (MP)
Media Protection policy
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
ACCESS CONTROL POLICY & PROCEDURES (AC)
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of Media Protection (MP) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
Access authorization policy MP-8 (3)
MP-8 (4)
Access control POLICY & PROCEDURES MP-2
Access control POLICY & PROCEDURES MP-4
MP-4 (2)
MP-5
Applicable federal and organizational standards and policies regarding protection of CUI MP-8 (3)
Applicable federal standards and policies addressing media sanitization MP-6
Information system media protection policy MP-2
MP-3
MP-4
MP-4 (2)
MP-5
MP-5 (3)
MP-5 (4)
MP-6
MP-6 (1)
MP-6 (2)
MP-6 (3)
MP-6 (7)
MP-6 (8)
MP-7
MP-7 (1)
MP-7 (2)
MP-8
MP-8 (1)
MP-8 (2)
MP-8 (3)
MP-8 (4)
Media protection POLICY & PROCEDURES MP-1
NSA standards and policies regarding protection of classified information MP-8 (4)
Physical and environmental protection POLICY & PROCEDURES MP-2
MP-3
MP-4
MP-4 (2)
MP-5
MP-5 (3)
Procedures addressing downgrading of media containing classified information MP-8 (4)
Procedures addressing downgrading of media containing CUI MP-8 (3)
Procedures addressing handling of classified information MP-8 (4)
Procedures addressing media access restrictions MP-2
Procedures addressing media downgrading MP-8
MP-8 (1)
MP-8 (2)
Procedures addressing media marking MP-3
Procedures addressing media sanitization and disposal MP-6 (1)
MP-6 (2)
MP-6 (3)
MP-6 (7)
MP-6 (8)
Procedures addressing media storage MP-4
MP-4 (2)
MP-5
Procedures addressing media transport MP-5 (3)
Procedures addressing media transport MP-5 (4)
Procedures addressing media usage restrictions MP-7
MP-7 (1)
MP-7 (2)
Procedures addressing testing of media downgrading equipment MP-8 (2)
Procedures addressing testing of media sanitization equipment MP-6 (2)
System use policy MP-7
MP-7 (1)
MP-7 (2)

Evidence, Records & Artifacts

Here you'll find a catalog of Media Protection (MP) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Access control devices MP-4 (2)
Access control records MP-2
MP-4 (2)
Applicable federal and organizational standards and policies regarding protection of CUI MP-8 (3)
Applicable federal standards and policies addressing media sanitization MP-6
Approvals for media sanitization and disposal actions MP-6 (1)
Audit records MP-4 (2)
MP-5 (3)
MP-5 (4)
MP-6
MP-6 (1)
MP-6 (2)
MP-6 (3)
MP-6 (7)
MP-6 (8)
MP-7
MP-7 (1)
MP-7 (2)
MP-8
MP-8 (1)
MP-8 (2)
Authorization records MP-6 (7)
Designated controlled areas MP-3
MP-4
MP-5
Information system media MP-4
MP-5
Information system media transport records MP-5 (3)
MP-5 (4)
Media downgrading records MP-8 (3)
MP-8 (4)
Media sanitization and disposal records MP-6 (1)
Media sanitization records MP-6
MP-6 (3)
MP-6 (7)
MP-6 (8)
Media storage facilities MP-2
MP-4 (2)
Records of media downgrading MP-8
MP-8 (1)
Results of downgrading equipment and procedures testing MP-8 (2)
Results of media sanitization equipment and procedures testing MP-6 (2)
Review records for media sanitization and disposal actions MP-6 (1)
Rules of behavior MP-7
MP-7 (1)
MP-7 (2)
System categorization documentation MP-8
Tracking records MP-6 (1)
Verification records MP-6 (1)

Media Protection Related Lists

These are the Media Protection (MP) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
List of circumstances requiring sanitization of portable storage devices MP-6 (3)
List of information system media marking security attributes MP-3
List of information system media requiring dual authorization for sanitization MP-6 (7)
List of media requiring downgrading MP-8
MP-8 (1)
Go to The List of Lists