ARTIFACTS

THE LIST OF LISTS

What's Here

The lists of list is a compilation of all of the lists associated with all of the controls and control enhancements in the risk management framework (RMF). From here you can navigate to control family specific pages which have a consolidated list of lists recommended for that control family.

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

LISTS — A TIME HONORED DESIGN TOOL

Lists are a time honored tool for solving problems, building action plans (aka "The To-Do List"), understanding complex relationships and prioritizing tasks. Lists take an abstract idea, like risk-based cybersecurity, and distill it into its human users; its tangible elements; its physical components; and, its digital attributes. Lists are how humans keep track of things.

Lists are an effective tool in developing solutions architectures. A collection of well constructed lists can lead to insight on how to design your digital enterprise; the business rules that best protect your information supply chain; and how to assess and understand risk; and how to build security in without stifling agile DevOps and continuous innovation. Figuring out what you don't have on a list for might reveal holes and vulnerabilities in your security strategy. A collection of lists will enhance your security program providing a resource for assessing risk, investigating incidents, recovering from a disaster, or making it through an audit.

Here is a list of lists you can used for cybersecurity program management and operation of your digital enterprise. The list are organized alphabetically with the associated Risk Management Framework (RMF) controls and control enhancements. The control information tell you where a list is used to assess compliance.

For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

Pick the lists most relevent to your organization and get started.
When you're done you'll have a solid knowledge base about your digital enterprise and digital information supply chain.
LIST APPLICABLE
CONTROL(S)
Access control list AU-9 (4)
AU-9 (6)
Authorized personnel access list PE-2
PE-2 (3)
Incident response records, list of security-relevant changes to the information system SI-7 (8)
Information system-generated list of emergency accounts removed and/or disabled AC-2 (2)
AC-2 (3)
Information system-generated list of privileged user accounts and associated role AC-2 (7)
Information system-generated list of temporary accounts removed and/or disabled AC-2 (2)
AC-2 (3)
Information systems or information system components list of connection ports or input/output devices to be physically disabled or removed on information systems or information system components SC-41
List of acceptable formats for input restrictions SI-10 (5)
List of acceptable forms of identification for visitor access to the facility where information system resides PE-2 (2)
List of acceptable mobile code and mobile code technologies SC-18
List of acceptable thresholds for false positives and false negatives SI-4 (13)
List of actions ensuring required access authorizations and screening criteria are satisfied SA-21 (1)
List of actions required before execution of mobile code SC-18 (4)
List of actions requiring dual authorization AC-3 (2)
List of actions to be performed regarding information spillage IR-9
List of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation SA-5
List of actions to be taken once information system component failure is detected SI-13 (4)
List of active system accounts along with the name of the individual associated with each account AC-2
List of all managed network access control points AC-17 (3)
List of alternative communications protocols supporting continuity of operations CP-11
List of applicable, legally binding post-employment requirements PS-4 (1)
PS-6 (3)
List of applications to be loaded from hardware-enforced, read-only media SC-34
List of appropriate access authorizations required by developers of the information system SA-21
SA-21 (1)
List of appropriate incident response actions IR-4 (3)
List of approved authorizations (user privileges) AC-3
AC-3 (2)
List of approved PKI Class 3 and Class 4 certificates SC-12 (3)
List of areas within the facility containing concentrations of information system components or information system components requiring additional physical access monitoring PE-6 (4)
List of areas within the facility containing concentrations of information system components or information system components requiring additional physical protection PE-3 (1)
List of assigned access authorizations (user privileges) AC-6
List of audit events MA-4 (1)
List of auditable events AU-12
List of audited events AC-6 (9)
List of authenticators requiring in-person registration IA-5 (3)
List of authenticators requiring trusted third party registration IA-5 (3)
List of authorized personnel MA-5
List of benchmarks for taking corrective action on flaws identified SI-2 (3)
List of binding techniques to bind security attributes to information AC-4 (18)
List of biometric quality requirements IA-5 (12)
List of certificate authorities allowed for verification of the establishment of protected sessions SC-23 (5)
List of characteristics identifying individual status IA-4 (4)
List of circumstances or situations requiring re-authentication IA-11
List of circumstances requiring sanitization of portable storage devices MP-6 (3)
List of classes of incidents IR-4 (3)
List of code requiring manual reviews SA-11 (4)
List of communication clients independently configured by end users and external service providers SC-7 (19)
List of components or classes of components authorized as internal system connections CA-9
CA-9 (1)
List of concealment and misdirection techniques to be employed for organizational information systems SC-30
List of conditions for group and role membership AC-2
List of conditions or trigger events requiring session disconnect AC-12
List of conditions requiring human reviews for information flows AC-4 (9)
List of confined virtual machine environments for which execution of organizationally-acceptable mobile code is allowed SC-18 (5)
List of corrective actions to be taken when unacceptable mobile code is identified SC-18 (1)
List of covert channels SC-31 (1)
List of critical information system components and functions identified by criticality analyses SA-14
List of critical information system components requiring automatic voltage controls PE-9 (2)
List of critical security functions SC-3 (2)
List of data content policy filters AC-4 (14)
List of data type identifiers AC-4 (12)
List of denial of service attacks launched by individuals against information systems SC-5 (1)
List of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks SC-5
List of devices possessing environmental sensing capabilities SC-42 (3)
List of devices requiring unique IDENTIFICATION & AUTHENTICATION IA-3
IA-3 (1)
List of distributed processing and storage components subject to polling SC-36 (1)
List of divisions of responsibility and separation of duties AC-5
List of external organizations IR-4 (8)
List of failures requiring information system to fail in a known state SC-24
List of FICAM-approved information system components procured and implemented by organization IA-8 (3)
List of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization IA-8 (2)
List of FICAM-issued profiles and associated, approved protocols IA-8 (4)
List of FIPS validated cryptographic modules SC-13
List of FIPS validated cryptographic products SC-12 (2)
List of flaws and vulnerabilities potentially affecting the information system SI-2
List of identifiers generated from physical access control devices IA-4
List of inappropriate or unusual activities (with security implications) that trigger alerts SI-4 (12)
List of individuals authorized to change security attributes AC-16 (2)
List of individuals having accounts on multiple information systems IA-5 (8)
List of individuals who have been identified as posing an increased level of risk SI-4 (19)
List of information at rest requiring confidentiality and integrity protections SC-28
List of information flow authorizations AC-4
List of information inputs requiring validity checks SI-10
List of information sharing circumstances requiring user discretion AC-21
List of information system accounts IA-2
IA-2 (1)
IA-2 (2)
IA-2 (3)
IA-2 (4)
IA-2 (5)
IA-2 (6)
IA-2 (7)
IA-4
IA-8
PS-4
List of information system accounts and services requiring single sign-on capability IA-2 (10)
List of information system and facility access authorizations PS-5
List of information system authenticator types IA-5
List of information system components for vulnerability scanning RA-5 (5)
List of information system components requiring host-based monitoring SI-4 (23)
List of information system components requiring protection through lockable physical casings PE-3 (4)
List of information system components to be dynamically isolated/segregated from other components of the system SC-7 (20)
List of information system components to be employed without writeable storage capability SC-34 (1)
List of information system components to be hidden or concealed SC-30 (5)
List of information system execution domains for each thread in multi-threaded processing SC-39 (2)
List of information system media marking security attributes MP-3
List of information system media requiring dual authorization for sanitization MP-6 (7)
List of information system physical domains (or environments) SC-32
List of information system physical locations (or environments) with distributed processing and storage SC-36
List of information systems, information system components, or information system services requiring criticality analyses SA-14
List of information types from nontechnical sources for correlation with audit information AU-6 (9)
List of information, information system components, or devices to be delivered to designated individuals or information systems SC-37 (1)
List of key internal boundaries of the information system SC-7
List of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system PE-15
List of limitations to be enforced on embedding data types within other data types AC-4 (5)
List of maintenance personnel requiring escort/supervision MA-5 (1)
List of measures to be employed to ensure data or information collected by sensors is only used for authorized purposes SC-42 (2)
List of mechanisms and/or techniques used to logically or physically separate information flows AC-4 (21)
List of media requiring downgrading MP-8
MP-8 (1)
List of mobile devices to be purged/wiped after organization-defined consecutive, unsuccessful device logon attempts AC-7 (2)
List of MTTF substitution criteria SI-13
List of network accessible storage devices prohibited from use in external information systems AC-20 (4)
List of non-organizational users AC-6 (6)
List of non-privileged information system accounts IA-2 (9)
List of NSA-approved cryptographic products SC-12 (2)
SC-12 (3)
List of operating system components to be loaded from hardware-enforced, read-only media SC-34
List of operating systems and applications deployed using virtualization techniques SC-29 (1)
List of operational needs for authorizing network access to privileged commands AC-6 (3)
List of operations security safeguards SC-38
List of organization-defined auditable events AU-2 (3)
AU-3
AU-3 (1)
AU-3 (2)
List of organizational assets requiring tracking and monitoring PE-20
List of out-of-band channels SC-37
List of output devices and associated outputs requiring physical access controls PE-5 (1)
List of output devices and associated outputs requiring physical access controls PE-5 (2)
List of personnel authorized to use maintenance tools MA-3 (4)
List of personnel responsible for responding to information spillage IR-9 (1)
List of personnel security requirements PS-7
List of personnel to be notified in case of an audit processing failure AU-5
List of physical and environmental hazards with potential to damage information system components within the facility PE-18
List of physical security safeguards applied to information system distribution and transmission lines PE-4
List of platform-independent applications SC-27
List of positions/roles and corresponding physical access authorizations PE-2 (1)
List of potential accessibility problems to alternate storage site CP-6 (3)
List of privileged and non-privileged information system accounts IA-2 (11)
List of privileged commands requiring dual authorization AC-3 (2)
List of privileged functions and associated user account assignments AC-6 (10)
List of privileged functions to be audited AC-6 (9)
List of privileged information system accounts IA-2 (8)
List of privileged users SI-4 (20)
List of processing/storage locations to be changed at organizational time intervals SC-30 (3)
List of profiles representing common traffic patterns and/or events SI-4 (13)
List of purging/wiping requirements or techniques for mobile devices AC-7 (2)
List of quality control processes to be included in developer's system development life cycle process SA-4 (3)
List of quality metrics SA-15 (1)
SA-15 (2)
List of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws) SI-2
List of recently disabled information system accounts along with the name of the individual associated with each account AC-2
List of required functions, ports, protocols, and other services SA-9 (2)
List of required separation of information flows by information types AC-4 (21)
List of response actions to be initiated when specific classes/types of intrusions are recognized PE-6 (2)
List of restricted ports, protocols, functions and services SA-15 (5)
List of risk designations for organizational positions PS-2
List of roles, users, and associated privileges required to control information system access AC-3 (7)
List of rules governing user installed software CM-11
List of secure work areas SC-15 (3)
List of security attributes and associated information, source, and destination objects enforcing information flow control policies AC-4 (1)
List of security controls required for alternate work sites PE-17
List of security functions (deployed in hardware, software, and firmware) and security-relevant information for which access must be explicitly authorized AC-6 (1)
List of security functions to be isolated from nonsecurity functions SC-3
List of security policy filtering criteria applied to metadata and data payloads AC-4 (19)
List of security policy filters AC-4 (11)
AC-4 (14)
List of security policy filters enabled/disabled by privileged administrators AC-4 (10)
List of security policy filters regulating flow control decisions AC-4 (8)
List of security safeguards controlling access to designated publicly accessible areas within facility PE-3
List of security safeguards ensuring adequate supply of critical information system components SA-12 (13)
List of security safeguards for delivering designated information, information system components, or devices to designated individuals or information systems SC-37 (1)
List of security safeguards intended to manage risk of compromise due to individuals having accounts on multiple information systems IA-5 (8)
List of security safeguards protecting against or limiting the effects of denial of service attacks SC-5
List of security safeguards protecting information system memory from unauthorized code execution SI-16
SI-17
List of security safeguards provided by receiving information system or system components AC-3 (9)
List of security safeguards to be employed to ensure designated individuals or information systems receive organization-defined information, information system components, or devices SC-37 (1)
List of security safeguards to be taken against supply chain threats SA-12
List of security safeguards to be taken to protect organizational supply chain against potential supply chain threats SA-12 (5)
List of security safeguards to detect/prevent physical tampering or alteration of information system hardware components PE-3 (5)
List of security safeguards validating appropriateness of information designated for release AC-3 (9)
List of security tools and support components to be isolated from other internal information system components SC-7 (13)
List of security-relevant hardware, software, and firmware components SA-17 (2)
List of signal parameter attacks or references to sources for attacks SC-40
List of software and firmware components to be prohibited from installation without a recognized and approved certificate CM-5 (3)
List of software applications for which automatic execution of mobile code must be prohibited SC-18 (4)
List of software development methods to be included in developer's system development life cycle process SA-4 (3)
List of software programs authorized to execute on the information system CM-7 (5)
List of software programs not authorized to execute on the information system CM-7 (4)
List of software that should not execute at higher privilege levels than users executing software AC-6 (8)
List of software usage restrictions CM-10
List of solutions in approved configurations AC-4 (20)
List of subjects and objects (i.e., users and resources) requiring enforcement of discretionary access control policies AC-3 (4)
List of subjects and objects (i.e., users and resources) requiring enforcement of mandatory access control policies AC-3 (3)
List of supply chain elements, processes, and actors (associated with the information system, system component, or information system service) requiring implementation of unique identification processes, procedures, tools, mechanisms, equipment, techniques and/or configurations SA-12 (14)
List of supply chain elements, processes, and actors (associated with the information system, system component, or information system service) subject to analysis and/or testing SA-12 (11)
List of supply chain threats SA-12
List of system administration personnel AC-6 (5)
List of system components requiring predictive maintenance MA-6 (2)
MA-6 (3)
List of system components requiring preventive maintenance MA-6 (1)
List of system components to be dynamically reconfigured as part of incident response capability IR-4 (2)
List of system transition states requiring security functionality verification SI-6
List of system-generated privileged accounts AC-6 (5)
AC-6 (6)
List of system-generated roles or classes of users and assigned privileges AC-6 (7)
List of system-generated security functions or security-relevant information assigned to information system accounts or roles AC-6 (2)
List of system/security engineering methods to be included in developer's system development life cycle process SA-4 (3)
List of techniques employed to hide or conceal information system components SC-30 (5)
List of techniques to be employed to introduce randomness into organizational operations and assets SC-30 (2)
List of technologies deployed in the information system SC-29
List of testing/evaluation/validation techniques to be included in developer's system development life cycle process SA-4 (3)
List of token quality requirements IA-5 (11)
List of trusted sources for information inputs SI-10 (5)
List of types of applications accessible from external information systems AC-20
List of types of meetings and teleconferences requiring explicit indication of current participants SC-15 (4)
List of unacceptable mobile code SC-18 (1)
List of unacceptable mobile code and mobile technologies SC-18
List of unsanctioned information types and associated information AC-4 (15)
List of user actions that can be performed without identification or authentication AC-14
List of user activities posing significant organizational risk AC-2 (13)
List of users authorized to associate security attributes to information AC-16 (4)
List of users authorized to make information sharing/collaboration decisions AC-21
List of users authorized to post publicly accessible content on organizational information systems AC-22
List or internal and external wireless links SC-40
List or other documentation on the cross-discipline insider threat incident handling team PM-12
List or other documentation on the cross-organization information-sharing capability PM-16
Lists or other documentation about contact with and/or membership in security groups and associations PM-15
Lists or other documentation about security authorization process roles and responsibilities PM-10
Personnel access authorization list RA-5 (5)
Physical access list reviews PE-2
PKI certification revocation lists IA-5 (2)
Records of information spillage alerts/notifications, list of personnel who should receive alerts of information spillage IR-9
Review and update records associated with list of authorized software programs CM-7 (5)
Review and update records associated with list of unauthorized software programs CM-7 (4)
Security configuration checklists CM-6
CM-6 (1)
CM-7
CM-7 (1)
CM-7 (4)
CM-7 (5)
System-generated list of access restrictions regarding information to be shared AC-21 (1)
AC-21 (2)
System-generated list of disabled accounts AC-2 (13)
System-generated list of dynamic privilege management capabilities AC-2 (6)
System-generated list of individuals or roles authorized to change auditing to be performed AU-12 (3)
System-generated list of information system accounts AC-2 (8)
System-generated list of information system accounts and associated assignments of usage circumstances and/or usage conditions AC-2 (11)
System-generated list of out-of-band authentication paths IA-2 (13)
System-generated list of privileged users with access to management of audit functionality AU-9 (4)
System-generated list of privileged users with read-only access to audit information AU-9 (6)
System-generated list of shared/group accounts and associated role AC-2 (9)
System-generated list of sharing partners and access authorizations AC-21 (1)
System-generated list of users authorized to make information sharing/collaboration decisions AC-21 (1)