Under active development Content is continuously updated and improved

CA-2 (03)Control Assessments | Leveraging Results from External Organizations

Moderate
High

>Control Description

Leverage the results of control assessments performed by organization-defined external organization on organization-defined system when the assessment meets organization-defined requirements.

>FedRAMP Baseline Requirements

No FedRAMP-specific parameter values or requirements for this baseline.

>Discussion

Organizations may rely on control assessments of organizational systems by other (external) organizations. Using such assessments and reusing existing assessment evidence can decrease the time and resources required for assessments by limiting the independent assessment activities that organizations need to perform. The factors that organizations consider in determining whether to accept assessment results from external organizations can vary.

Such factors include the organization's past experience with the organization that conducted the assessment, the reputation of the assessment organization, the level of detail of supporting assessment evidence provided, and mandates imposed by applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Accredited testing laboratories that support the Common Criteria Program ISO 15408-1, the NIST Cryptographic Module Validation Program (CMVP), or the NIST Cryptographic Algorithm Validation Program (CAVP) can provide independent assessment results that organizations can leverage.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CA-2(3) (Leveraging Results From External Organizations)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CA-2(3)?
  • How frequently is the CA-2(3) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CA-2(3)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CA-2(3) requirements.
  • What automated tools, systems, or technologies are deployed to implement CA-2(3)?
  • How is CA-2(3) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CA-2(3) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CA-2(3)?
  • What audit logs, records, reports, or monitoring data validate CA-2(3) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CA-2(3) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CA-2(3) compliance?

Ask AI

Configure your API key to use AI features.