Under active development Content is continuously updated and improved

CA-1Security Assessment And Authorization Policies And Procedures

PBMM (P1)
Secret (P1)
Management

>Control Description

(A) The organization develops, documents, and disseminates to organization-defined personnel or roles: (a) A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls. (B) The organization reviews and updates the current: (a) Security assessment and authorization policy organization-defined frequency; and (b) Security assessment and authorization procedures organization-defined frequency.

>Supplemental Guidance

This control addresses the establishment of policies and procedures for the effective implementation of selected security controls and control enhancements in the CA family. The security assessment and authorization policies and procedures reflect applicable GC legislation and TBS policies, directives and standards. Security program policies and procedures at the organization level may make system-specific policies and procedures unnecessary.

The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policies and procedures.

>Profile-Specific Parameters

(A) (B) frequency [at a frequency no longer than annually]

Ask AI

Configure your API key to use AI features.