Under active development Content is continuously updated and improved

CM-12(1)Information Location | Automated Tools to Support Information Location

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Use automated tools to identify organization-defined information by information type on organization-defined system components to ensure controls are in place to protect organizational information and individual privacy.

>DoD Impact Level Requirements

FedRAMP Parameter Values

CM-12 (1)-1: [Federal data and system data that must be protected at the High or Moderate impact levels]

Additional Requirements and Guidance

CM-12 (1) Requirement: According to FedRAMP Authorization Boundary Guidance.

>Discussion

The use of automated tools helps to increase the effectiveness and efficiency of the information location capability implemented within the system. Automation also helps organizations manage the data produced during information location activities and share such information across the organization. The output of automated information location tools can be used to guide and inform system architecture and design decisions.

>Programmatic Queries

Beta

Related Services

Amazon Macie
AWS Security Hub

CLI Commands

Enable Macie to discover sensitive data locations
aws macie2 enable-macie --finding-publishing-frequency FIFTEEN_MINUTES --region us-east-1
Create Macie custom data identifiers for information classification
aws macie2 create-custom-data-identifier --name PII-Detector --regex-pattern "(\d{3}-\d{2}-\d{4})" --region us-east-1
List Macie findings for sensitive data in buckets
aws macie2 list-findings --filter-criteria '{"resourceType": [{"eq": ["S3Bucket"]}]}' --region us-east-1
Get discovery job status for S3 bucket scanning
aws macie2 describe-classification-job --job-id job-123456 --region us-east-1

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CM-12(1) (Automated Tools To Support Information Location)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CM-12(1)?
  • How frequently is the CM-12(1) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CM-12(1)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CM-12(1) requirements.
  • What automated tools, systems, or technologies are deployed to implement CM-12(1)?
  • How is CM-12(1) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CM-12(1) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CM-12(1)?
  • What audit logs, records, reports, or monitoring data validate CM-12(1) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CM-12(1) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CM-12(1) compliance?

Ask AI

Configure your API key to use AI features.