Control Domain |
Control |
Name |
MetadataId |
Category |
Title |
Owner |
Requirements |
Description |
Info |
Policy# |
FedRAMP_High_R4 |
CA-7(3) |
FedRAMP_High_R4_CA-7(3) |
FedRAMP High CA-7 (3) |
Security Assessment And Authorization |
Trend Analyses |
Shared |
n/a |
The organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
Supplemental Guidance: Trend analyses can include, for example, examining recent threat information regarding the types of threat events that have occurred within the organization or across the federal government, success rates of certain types of cyber attacks, emerging vulnerabilities in information technologies, evolving social engineering techniques, results from multiple security control assessments, the effectiveness of configuration settings, and findings from Inspectors General or auditors. |
link |
1 |
hipaa |
0604.06g2Organizational.2-06.g |
hipaa-0604.06g2Organizational.2-06.g |
0604.06g2Organizational.2-06.g |
06 Configuration Management |
0604.06g2Organizational.2-06.g 06.02 Compliance with Security Policies and Standards, and Technical Compliance |
Shared |
n/a |
The organization has developed a continuous monitoring strategy and implemented a continuous monitoring program. |
|
7 |
NIST_SP_800-53_R4 |
CA-7(3) |
NIST_SP_800-53_R4_CA-7(3) |
NIST SP 800-53 Rev. 4 CA-7 (3) |
Security Assessment And Authorization |
Trend Analyses |
Shared |
n/a |
The organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
Supplemental Guidance: Trend analyses can include, for example, examining recent threat information regarding the types of threat events that have occurred within the organization or across the federal government, success rates of certain types of cyber attacks, emerging vulnerabilities in information technologies, evolving social engineering techniques, results from multiple security control assessments, the effectiveness of configuration settings, and findings from Inspectors General or auditors. |
link |
1 |
NIST_SP_800-53_R5 |
CA-7(3) |
NIST_SP_800-53_R5_CA-7(3) |
NIST SP 800-53 Rev. 5 CA-7 (3) |
Assessment, Authorization, and Monitoring |
Trend Analyses |
Shared |
n/a |
Employ trend analyses to determine if control implementations, the frequency of continuous monitoring activities, and the types of activities used in the continuous monitoring process need to be modified based on empirical data. |
link |
1 |