SI-5—Security Alerts, Advisories, and Directives
>Control Description
Receive system security alerts, advisories, and directives from ⚙organization-defined external organizations on an ongoing basis;
Generate internal security alerts, advisories, and directives as deemed necessary;
Disseminate security alerts, advisories, and directives to: [Selection (one or more): ⚙organization-defined personnel or roles; ⚙organization-defined elements within the organization; ⚙organization-defined external organizations]; and
Implement security directives in accordance with established time frames, or notify the issuing organization of the degree of noncompliance.
>FedRAMP Baseline Requirements
Parameter Values
Additional Requirements and Guidance
SI-5 Requirement: Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.
>Discussion
The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance with security directives is essential due to the critical nature of many of these directives and the potential (immediate) adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner.
External organizations include supply chain partners, external mission or business partners, external service providers, and other peer or supporting organizations.
>Cross-Framework Mappings
>Programmatic Queries
Related Services
CLI Commands
aws health describe-events --filter 'eventTypeCategories=issue,scheduledChange'aws securityhub get-findings --filters '{"ProductName":[{"Value":"Security Hub","Comparison":"EQUALS"}]}'aws support describe-trusted-advisor-check-result --check-id SECURITY_CHECK_IDaws health describe-affected-entities --filter 'eventArns=EVENT_ARN'>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies and procedures govern security alerts, advisories, and directives?
- •Who is responsible for monitoring system and information integrity?
- •How frequently are integrity monitoring processes reviewed and updated?
Technical Implementation:
- •What technical controls detect and respond to security alerts, advisories, and directives issues?
- •How are integrity violations identified and reported?
- •What automated tools support system and information integrity monitoring?
Evidence & Documentation:
- •Can you provide recent integrity monitoring reports or alerts?
- •What logs demonstrate that SI-5 is actively implemented?
- •Where is evidence of integrity monitoring maintained and for how long?
Ask AI
Configure your API key to use AI features.