Under active development Content is continuously updated and improved

CP-6(3)Alternate Storage Site | Accessibility

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Identify potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outline explicit mitigation actions.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Area-wide disruptions refer to those types of disruptions that are broad in geographic scope with such determinations made by organizations based on organizational assessments of risk. Explicit mitigation actions include duplicating backup information at other alternate storage sites if access problems occur at originally designated alternate sites or planning for physical access to retrieve backup information if electronic accessibility to the alternate site is disrupted.

>Programmatic Queries

Beta

Related Services

AWS VPN
AWS Direct Connect
AWS CloudFront

CLI Commands

Create VPN connection to alternate storage site
aws ec2 create-vpn-connection --type ipsec.1 --customer-gateway-id cgw-123456 --vpn-gateway-id vgw-789012
Enable VPN connection for accessibility
aws ec2 enable-vpn-connection --vpn-connection-id vpn-123456
Get route table for alternate site access
aws ec2 describe-route-tables --filters Name=vpc-id,Values=vpc-123456
Create CloudFront distribution for alternate storage access
aws cloudfront create-distribution --origin-domain-name alternate-cp-6-3.s3.us-west-2.amazonaws.com --enabled

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-6(3) (Accessibility)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-6(3)?
  • How frequently is the CP-6(3) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-6(3) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-6(3) requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-6(3)?
  • How is CP-6(3) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-6(3) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-6(3)?
  • What audit logs, records, reports, or monitoring data validate CP-6(3) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-6(3) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-6(3) compliance?

Ask AI

Configure your API key to use AI features.