AC-22—Publicly Accessible Content
>Control Description
Designate individuals authorized to make information publicly accessible;
Train authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
Review the proposed content of information prior to posting onto the publicly accessible system to ensure that nonpublic information is not included; and
Review the content on the publicly accessible system for nonpublic information ⚙organization-defined frequency and remove such information, if discovered.
>FedRAMP Baseline Requirements
Parameter Values
>Discussion
In accordance with applicable laws, executive orders, directives, policies, regulations, standards, and guidelines, the public is not authorized to have access to nonpublic information, including information protected under the PRIVACT and proprietary information. Publicly accessible content addresses systems that are controlled by the organization and accessible to the public, typically without identification or authentication. Posting information on non-organizational systems (e.g., non-organizational public websites, forums, and social media) is covered by organizational policy.
While organizations may have individuals who are responsible for developing and implementing policies about the information that can be made publicly accessible, publicly accessible content addresses the management of the individuals who make such information publicly accessible.
>Cross-Framework Mappings
>Programmatic Queries
Related Services
CLI Commands
aws s3api list-buckets --query 'Buckets[].Name' | xargs -I {} aws s3api get-bucket-acl --bucket {}aws s3control get-public-access-block --account-id ACCOUNT_IDaws cloudfront list-distributions --query 'DistributionList.Items[*].{Id:Id,Domain:DomainName,Origins:Origins.Items[*].DomainName}'aws apigateway get-rest-apis --query 'items[?endpointConfiguration.types[0]==`REGIONAL`]'>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AC-22 (Publicly Accessible Content)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AC-22?
- •How frequently is the AC-22 policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AC-22?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AC-22 requirements.
- •What automated tools, systems, or technologies are deployed to implement AC-22?
- •How is AC-22 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AC-22 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AC-22?
- •What audit logs, records, reports, or monitoring data validate AC-22 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AC-22 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AC-22 compliance?
Ask AI
Configure your API key to use AI features.