Appendix G Control Baselines
| CONTROL | CONTROL BASELINES | |||
|---|---|---|---|---|
| NO. | NAME | LOW | MOD | HIGH | 
| AU-10 | Non-repudiation | Not Selected | Not Selected | Not Selected | 
| AU-11 | Audit Retention | AU-11 | AU-11 | AU-11 | 
| CERTIFICATION, ACCREDITATION, AND SECURITY ASSESSMENTS | ||||
| CA-1 | Certification, Accreditation, and Security Assessment Policies and Procedures | CA-1 | CA-1 | CA-1 | 
| CA-2 | Security Assessments | Not Selected | CA-2 | CA-3 | 
| CA-3 | Information System Connections | CA-3 | CA-3 | CA-3 | 
| CA-4 | Security Certification | CA-4 | CA-4 | CA-4 | 
| CA-5 | Plan of Action and Milestones | CA-5 | CA-5 | CA-5 | 
| CA-6 | Security Accreditation | CA-6 | CA-6 | CA-6 | 
| CA-7 | Continuous Monitoring | CA-7 | CA-7 | CA-7 | 
| CONFIGURATION MANAGEMENT | ||||
| CM-1 | Configuration Management Policy and Procedures | CM-1 | CM-1 | CM-1 | 
| CM-2 | Baseline Configuration | CM-2 | CM-2 (1) | CM-2 (1) (2) | 
| CM-3 | Configuration Change Control | Not Selected | CM-3 | CM-3 (1) | 
| CM-4 | Monitoring Configuration Changes | Not Selected | CM-4 | CM-4 | 
| CM-5 | Access Restrictions for Change | Not Selected | CM-5 | CM-5 (1) | 
| CM-6 | Configuration Settings | CM-6 | CM-6 | CM-6 (1) | 
| CM-7 | Least Functionality | Not Selected | CM-7 | CM-7 (1) | 
| CONTINGENCY PLANNING | ||||
| CP-1 | Contingency Planning Policy and Procedures | CP-1 | CP-1 | CP-1 | 
| CP-2 | Contingency Plan | CP-2 | CP-2 (1) | CP-2 (1) | 
| CP-3 | Contingency Training | Not Selected | CP-3 | CP-3 (1) | 
| CP-4 | Contingency Plan Testing | Not Selected | CP-4 (1) | CP-4 (1) (2) | 
| CP-5 | Contingency Plan Update | CP-5 | CP-5 | CP-5 | 
| CP-6 | Alternate Storage Sites | Not Selected | CP-6 (1) | CP-6 (1) (2) (3) | 
| CP-7 | Alternate Processing Sites | Not Selected | CP-7 (1) (2) (3) | CP-7 (1) (2) (3) (4) | 
| CP-8 | Telecommunications Services | Not Selected | CP-8 (1) (2) | CP-8 (1) (2) (3) (4) | 
| CP-9 | Information System Backup | CP-9 | CP-9 (1) | CP-9 (1) (2) (3) | 
| CP-10 | Information System Recovery and Reconstitution | CP-10 | CP-10 | CP-10 (1) | 
| IDENTIFICATION AND AUTHENTICATION | ||||
| IA-1 | Identification and Authentication Policy and Procedures | IA-1 | IA-1 | IA-1 | 
| IA-2 | User Identification and Authentication | IA-2 | IA-2 | IA-2 (1) | 
| IA-3 | Device Identification and Authentication | Not Selected | IA-3 | IA-3 | 
| IA-4 | Identifier Management | IA-4 | IA-4 | IA-4 | 
| IA-5 | Authenticator Management | IA-5 | IA-5 | IA-5 | 
| IA-6 | Authenticator Feedback | IA-6 | IA-6 | IA-6 | 
| IA-7 | Cryptographic Module Authorization | IA-7 | IA-7 | IA-7 | 
| INCIDENT RESPONSE | ||||
| IR-1 | Incident Response Policy and Procedures | IR-1 | IR-1 | IR-1 | 
| IR-2 | Incident Response Training | Not Selected | IR-2 | IR-2 (1) (2) | 
| IR-3 | Incident Response Testing | Not Selected | IR-3 | IR-3 (1) | 
| IR-4 | Incident Handling | IR-4 | IR-4 (1) | IR-4 (1) | 
| IR-5 | Incident Monitoring | Not Selected | IR-5 | IR-5 (1) | 
| IR-6 | Incident Reporting | IR-6 | IR-6 (1) | IR-6 (1) | 
| IR-7 | Incident Response Assistance | IR-7 | IR-7 (1) | IR-7 (1) | 
| MAINTENANCE | ||||
| MA-1 | System Maintenance Policy and Procedures | MA-1 | MA-1 | MA-1 | 
| MA-2 | Periodic Maintenance | MA-2 | MA-2 (1) | MA-2 (1) (2) | 
| MA-3 | Maintenance Tools | Not Selected | MA-3 | MA-3 (1) (2) (3) | 
| MA-4 | Remote Maintenance | MA-4 | MA-4 | MA-4 (1) (2) (3) | 
| MA-5 | Maintenance Personnel | MA-5 | MA-5 | MA-5 | 
| MA-6 | Timely Maintenance | Not Selected | MA-6 | MA-6 | 
| MEDIA PROTECTION | ||||
| MP-1 | Media Protection Policy and Procedures | MP-1 | MP-1 | MP-1 | 
| MP-2 | Media Access | MP-2 | MP-2 | MP-2 (1) | 
| MP-3 | Media Labeling | Not Selected | MP-3 | MP-3 | 
| MP-4 | Media Storage | Not Selected | MP-4 | MP-4 | 
| MP-5 | Media Transport | Not Selected | MP-5 | MP-5 | 
| MP-6 | Media Sanitization | Not Selected | MP-6 | MP-6 | 
| MP-7 | Media Destruction and Disposal | MP-7 | MP-7 | MP-7 | 
| PHYSICAL AND ENVIRONMENTAL PROTECTION | ||||
| PE-1 | Physical and Environmental Protection Policy and Procedures | PE-1 | PE-1 | PE-1 | 
| PE-2 | Physical Access Authorization | PE-2 | PE-2 | PE-2 | 
| PE-3 | Physical Access Control | PE-3 | PE-3 | PE-3 | 
| PE-4 | Access Control for Transmission Medium | Not Selected | Not Selected | Not Selected | 
| PE-5 | Access Control for Display Medium | Not Selected | PE-5 | PE-5 | 
| PE-6 | Monitoring Physical Access | PE-6 | PE-6 (1) | PE-6 (1) (2) | 
| PE-7 | Visitor Control | PE-7 | PE-7 (1) | PE-7 (1) | 
| PE-8 | Access Logs | PE-8 | PE-8 (1) | PE-8 (1) | 
| PE-9 | Power Equipment and Power Cabling | Not Selected | PE-9 | PE-9 | 
| PE-10 | Emergency Shutoff | Not Selected | PE-9 | PE-9 | 
| PE-11 | Emergency Power | Not Selected | PE-10 | PE-10 | 
| PE-12 | Emergency Lighting | PE-12 | PE-12 | PE-12 | 
| PE-13 | Fire Protection | PE-13 | PE-13 (1) | PE-13 (1) (2) | 
| PE-14 | Temperature and Humidity Controls | PE-14 | PE-14 | PE-14 | 
| PE-15 | Water Damage Protection | PE-15 | PE-15 | PE-15 (1) | 
| PE-16 | Delivery and Removal | PE-16 | PE-16 | PE-16 | 
| PE-17 | Alternate Work Site | Not Selected | PE-17 | PE-17 | 
| PLANNING | ||||
| PL-1 | Security Planning Policy and Procedures | PL-1 | PL-1 | PL-1 | 
| PL-2 | System Security Plan | PL-2 | PL-2 | PL-2 | 
| PL-3 | System Security Plan Update | PL-3 | PL-3 | PL-3 | 
| PL-4 | Rules of Behavior | PL-4 | PL-4 | PL-4 | 
| PL-5 | Privacy Impact Assessment | PL-5 | PL-5 | PL-5 | 
| PERSONNEL SECURITY | ||||
| PS-1 | Personnel Security Policy and Procedures | PS-1 | PS-1 | PS-1 | 
| PS-2 | Position Categorization | PS-2 | PS-2 | PS-2 | 
| PS-3 | Personnel Screening | PS-3 | PS-3 | PS-3 | 
| PS-4 | Personnel Termination | PS-4 | PS-4 | PS-4 | 
| PS-5 | Personnel Transfer | PS-5 | PS-5 | PS-5 | 
| PS-6 | Access Agreements | PS-6 | PS-6 | PS-6 | 
| PS-7 | Third-Party Personnel Security | PS-7 | PS-7 | PS-7 | 
| PS-8 | Personnel Sanctions | PS-8 | PS-8 | PS-8 | 
| RISK ASSESSMENT | ||||
| RA-1 | Risk Assessment Policy and Procedures | RA-1 | RA-1 | RA-1 | 
| RA-2 | Security Categorization | RA-2 | RA-2 | RA-2 | 
| RA-3 | Risk Assessment | RA-3 | RA-3 | RA-3 | 
| RA-4 | Risk Assessment Update | RA-4 | RA-4 | RA-4 | 
| RA-5 | Vulnerability Scanning | Not Selected | RA-5 | RA-5 (1) (2) | 
| SYSTEM AND SERVICES ACQUISITION | ||||
| SA-1 | System and Services Acquisition Policy and Procedures | SA-1 | SA-1 | SA-1 | 
| SA-2 | Allocation of Resources | SA-2 | SA-2 | SA-2 | 
| SA-3 | Life Cycle Support | SA-3 | SA-3 | SA-3 | 
| SA-4 | Acquisitions | SA-4 | SA-4 | SA-4 | 
| SA-5 | Information Systems Documentation | SA-5 | SA-5 (1) | SA-5 (1) (2) | 
| SA-6 | Software Usage Restrictions | SA-6 | SA-6 | SA-6 | 
| SA-7 | User Installed Software | SA-7 | SA-7 | SA-7 | 
| SA-8 | Security Design Principles | Not Selected | SA-8 | SA-8 | 
| SA-9 | Outsourced Information System Services | SA-9 | SA-9 | SA-9 | 
| SA-10 | Developer Configuration Management | Not Selected | Not Selected | SA-10 | 
| SA-11 | Developer Security Testing | Not Selected | SA-11 | SA-11 | 
| SYSTEM AND COMMUNICATIONS PROTECTION | ||||
| SC-1 | System and Communications Protection Policy and Procedures | SC-1 | SC-1 | SC-1 | 
| SC-2 | Application Partitioning | Not Selected | SC-2 | SC-2 | 
| SC-3 | Security Function Isolation | Not Selected | Not Selected | SC-3 | 
| SC-4 | Information Remnants | Not Selected | SC-4 | SC-4 | 
| SC-5 | Denial of Service Protection | SC-5 | SC-5 | SC-5 | 
| SC-6 | Resource Priority | Not Selected | SC-6 | SC-6 | 
| SC-7 | Boundary Protection | SC-7 | SC-7 (1) | SC-7 (1) | 
| SC-8 | Transmission Integrity | Not Selected | SC-8 | SC-8 (1) | 
| SC-9 | Transmission Confidentiality | Not Selected | SC-9 | SC-9 (1) | 
| SC-10 | Network Disconnect | Not Selected | SC-10 | SC-10 | 
| SC-11 | Trusted Path | Not Selected | Not Selected | Not Selected | 
| SC-12 | Cryptographic Key Establishment and Management | Not Selected | SC-12 | SC-12 | 
| SC-13 | Use of Validated Cryptography | SC-13 | SC-13 | SC-13 | 
| SC-14 | Public Access Protections | SC-14 | SC-14 | SC-14 | 
| SC-15 | Collaborative Computing | Not Selected | SC-15 | SC-15 | 
| SC-16 | Transmission of Security Parameters | Not Selected | Not Selected | Not Selected | 
| SC-17 | Public Key Infrastructure Certificates | Not Selected | SC-17 | SC-17 | 
| SC-18 | Mobile Code | Not Selected | SC-18 | SC-18 | 
| SC-19 | Voice Over Internet Protocol | Not Selected | SC-19 | SC-19 | 
| SYSTEMS AND INFORMATION INTEGRITY | ||||
| SI-1 | Systems and Information Integrity Policy and Procedures | SI-1 | SI-1 | SI-1 | 
| SI-2 | Flaw Remediation | SI-2 | SI-2 | SI-2 | 
| SI-3 | Malicious Code Protection | SI-3 | SI-3 (1) | SI-3 (1) (2) | 
| SI-4 | Intrusion Detection Tools and Techniques | Not Selected | SI-4 | SI-4 | 
| SI-5 | Security Alerts and Advisories | SI-5 | SI-5 | SI-5 | 
| SI-6 | Security Functionality Verification | Not Selected | SI-6 | SI-6 (1) | 
| SI-7 | Software and Information Integrity | Not Selected | Not Selected | SI-7 | 
| SI-8 | Spam and Spyware Protection | Not Selected | SI-8 | SI-8 (1) | 
| SI-9 | Information Input Restrictions | Not Selected | SI-9 | SI-9 | 
| SI-10 | Information Input Accuracy, Completeness, and Validity | Not Selected | SI-10 | SI-10 | 
| SI-11 | Error Handling | Not Selected | SI-11 | SI-11 | 
| SI-12 | Information Output Handling and Retention | Not Selected | SI-12 | SI-12 |