MP-8—Media Downgrading
>Control Description
Establish ⚙organization-defined system media downgrading process that includes employing downgrading mechanisms with strength and integrity commensurate with the security category or classification of the information;
Verify that the system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information;
Identify ⚙organization-defined system media requiring downgrading; and
Downgrade the identified system media using the established process.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Media downgrading applies to digital and non-digital media subject to release outside of the organization, whether the media is considered removable or not. When applied to system media, the downgrading process removes information from the media, typically by security category or classification level, such that the information cannot be retrieved or reconstructed. Downgrading of media includes redacting information to enable wider release and distribution.
Downgrading ensures that empty space on the media is devoid of information.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of MP-8 (Media Downgrading)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring MP-8?
- •How frequently is the MP-8 policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures MP-8 requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce MP-8 requirements.
- •What automated tools, systems, or technologies are deployed to implement MP-8?
- •How is MP-8 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce MP-8 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of MP-8?
- •What audit logs, records, reports, or monitoring data validate MP-8 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of MP-8 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate MP-8 compliance?
Ask AI
Configure your API key to use AI features.