myctrl.tools
Compare

CP-13Alternative Security Mechanisms

>Control Description

Employ organization-defined alternative or supplemental security mechanisms for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.

>Cross-Framework Mappings

>Supplemental Guidance

Use of alternative security mechanisms supports system resiliency, contingency planning, and continuity of operations. To ensure mission and business continuity, organizations can implement alternative or supplemental security mechanisms. The mechanisms may be less effective than the primary mechanisms.

However, having the capability to readily employ alternative or supplemental mechanisms enhances mission and business continuity that might otherwise be adversely impacted if operations had to be curtailed until the primary means of implementing the functions was restored. Given the cost and level of effort required to provide such alternative capabilities, the alternative or supplemental mechanisms are only applied to critical security capabilities provided by systems, system components, or system services. For example, an organization may issue one-time pads to senior executives, officials, and system administrators if multi-factor tokens--the standard means for achieving secure authentication-- are compromised.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-13 (Alternative Security Mechanisms)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-13?
  • How frequently is the CP-13 policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-13 requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-13 requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-13?
  • How is CP-13 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-13 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-13?
  • What audit logs, records, reports, or monitoring data validate CP-13 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-13 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-13 compliance?

Ask AI

Configure your API key to use AI features.