Policy 7230A - Department of Administration
Policy 7230A - Department of Administration
Policy 7230A - Department of Administration
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CA-1 Certification, Accreditation, and Security Assessment Policies 6.0<br />
and Procedures<br />
CA-2 Security Assessments 6.1<br />
CA-3 Information System Connections 4.3<br />
CA-4 Security Certification 6.1<br />
CA-5 Plan <strong>of</strong> Action and Milestones 2.2<br />
6.1<br />
CA-7 Continuous Monitoring 6.2<br />
CM-1 Configuration Management Policies and Procedures 5.0<br />
CM-2 Baseline Configuration 5.1<br />
CM-3 Configuration Change Control 5.1<br />
CM-4 Monitoring Configuration Changes 5.1<br />
CM-5 Access Restrictions for Change 5.1<br />
CM-6 Configuration Settings 5.1<br />
5.1<br />
5.1<br />
CM-7 Least Functionality 5.1<br />
CM-8 Information System Component Inventory 5.1<br />
CP-1 Contingency Planning <strong>Policy</strong> and Procedures 9.0<br />
CP-2 Contingency Plan 9.1<br />
CP-3 Contingency Training 9.3<br />
CP-4 Contingency Plan Testing and Exercises 9.3<br />
CP-5 Contingency Plan Update 9.1<br />
CP-6 Alternate Storage Site 9.2<br />
CP-7 Alternate Processing Site 9.2<br />
CP-8 Telecommunications Services 9.2<br />
CP-9 Information System Backup 9.3<br />
CP-10 Information System Recovery and Reconstitution 9.3<br />
IA-1 Identification and Authentication <strong>Policy</strong> and Procedures 4.0<br />
IA-2 User Identification and Authentication 4.1<br />
IA-3 Device Identification and Authentication 4.3<br />
IA-4 Identifier Management 4.1<br />
IA-5 Authenticator Management 4.1<br />
IA-6 Authenticator Feedback 4.1<br />
IA-7 Cryptographic Module Authentication 4.1<br />
39