Control Domain |
Control |
Name |
MetadataId |
Category |
Title |
Owner |
Requirements |
Description |
Info |
Policy# |
FedRAMP_High_R4 |
CP-10(2) |
FedRAMP_High_R4_CP-10(2) |
FedRAMP High CP-10 (2) |
Contingency Planning |
Transaction Recovery |
Shared |
n/a |
The information system implements transaction recovery for systems that are transaction-based.
Supplemental Guidance: Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling. |
link |
1 |
FedRAMP_Moderate_R4 |
CP-10(2) |
FedRAMP_Moderate_R4_CP-10(2) |
FedRAMP Moderate CP-10 (2) |
Contingency Planning |
Transaction Recovery |
Shared |
n/a |
The information system implements transaction recovery for systems that are transaction-based.
Supplemental Guidance: Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling. |
link |
1 |
hipaa |
19141.06c1Organizational.7-06.c |
hipaa-19141.06c1Organizational.7-06.c |
19141.06c1Organizational.7-06.c |
19 Data Protection & Privacy |
19141.06c1Organizational.7-06.c 06.01 Compliance with Legal Requirements |
Shared |
n/a |
Important records, such as contracts, personnel records, financial information, client/customer information, etc., of the organization are protected from loss, destruction and falsification through the implementation of security controls such as access controls, encryption, backups, electronic signatures, locked facilities or containers, etc. |
|
10 |
ISO27001-2013 |
A.12.3.1 |
ISO27001-2013_A.12.3.1 |
ISO 27001:2013 A.12.3.1 |
Operations Security |
Information backup |
Shared |
n/a |
Backup copies of information, software and system images shall be taken and tested regularly in accordance with an agreed backup policy. |
link |
13 |
ISO27001-2013 |
A.17.1.2 |
ISO27001-2013_A.17.1.2 |
ISO 27001:2013 A.17.1.2 |
Information Security Aspects Of Business Continuity Management |
Implementing information security continuity |
Shared |
n/a |
The organization shall establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for information security during an adverse situation. |
link |
18 |
ISO27001-2013 |
A.18.1.3 |
ISO27001-2013_A.18.1.3 |
ISO 27001:2013 A.18.1.3 |
Compliance |
Protection of records |
Shared |
n/a |
Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legislative, regulatory, contractual and business requirements. |
link |
15 |
NIST_SP_800-53_R4 |
CP-10(2) |
NIST_SP_800-53_R4_CP-10(2) |
NIST SP 800-53 Rev. 4 CP-10 (2) |
Contingency Planning |
Transaction Recovery |
Shared |
n/a |
The information system implements transaction recovery for systems that are transaction-based.
Supplemental Guidance: Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling. |
link |
1 |
NIST_SP_800-53_R5 |
CP-10(2) |
NIST_SP_800-53_R5_CP-10(2) |
NIST SP 800-53 Rev. 5 CP-10 (2) |
Contingency Planning |
Transaction Recovery |
Shared |
n/a |
Implement transaction recovery for systems that are transaction-based. |
link |
1 |