mediate.com security policy · web viewnon applicable cp-4 contingency plan testing and exercises...

118
Resourceful Internet Solutions, Inc., dba Mediate.com RIS/Mediate Caseload Manager RIS/Mediate Caseload Manager System Security Plan April 25, 2013 This document contains confidential information for Resourceful Internet Solutions, Inc. / Mediate.com (RIS/Mediate) official use only. This document shall not be duplicated, used or disclosed in whole or in part without prior written permission from RIS/Mediate. Resourceful Internet Solutions, Inc. Security Staff CEO/President James Melamed

Upload: others

Post on 14-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc., dba Mediate.com

RIS/Mediate Caseload ManagerRIS/Mediate Caseload Manager

System Security PlanApril 25, 2013

This document contains confidential information for Resourceful Internet Solutions, Inc. / Mediate.com (RIS/Mediate) official use only. This document shall not be duplicated, used or disclosed in whole or in part without prior written permission from RIS/Mediate.

Resourceful Internet Solutions, Inc. Security Staff

CEO/President James MelamedSystems Admin Byron KnappCTOCOO

Carol KnappJosh Remis

Copyright 2011-13 Resourceful Internet Solutions, Inc.

Page 2: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Table of Contents

Executive Summary..........................................................................................................................iIntroduction.......................................................................................................................................iIntended Audience...........................................................................................................................iRIS/Mediate Caseload Manager SSP Summary.............................................................................i

System Compliance with Security Controls by Family.................................................................iiSystem Security Plan Approval.......................................................................................................ii

1 System Security Plan................................................................................................................11.1 Information System Description and Responsible Organization...........................................1

1.1.1 System Categorization....................................................................................................11.1.2 System Personnel Contacts...........................................................................................11.1.3 General System Description...........................................................................................21.1.4 System Technical Environment......................................................................................21.1.5 RIS/Mediate Caseload Manager Hardware.....................................................................21.1.6 Related Laws, Regulations, and Policies.......................................................................3

2 System Security Controls.........................................................................................................42.1 RIS/Mediate Caseload Manager Security Control Requirements & Implementation Details6

2.1.1 Risk Assessment (RA)....................................................................................................72.1.2 Planning (PL)..................................................................................................................92.1.3 System and Services Acquisition (SA).........................................................................122.1.4 Certification, Accreditation, and Security Assessments (CA).......................................162.1.5 Personnel Security (PS)...............................................................................................192.1.6 Physical and Environmental Protection (PE)................................................................212.1.7 Contingency Planning (CP)..........................................................................................262.1.8 Configuration Management (CM).................................................................................302.1.9 Maintenance (MA)........................................................................................................342.1.10 System and Information Integrity (SI)........................................................................362.1.11 Media Protection (MP)...............................................................................................402.1.12 Incident Response (IR)..............................................................................................422.1.13 Awareness and Training (AT)....................................................................................432.1.14 Identification and Authentication (IA).........................................................................462.1.15 Access Control (AC)..................................................................................................482.1.16 Audit and Accountability (AU)....................................................................................552.1.17 System and Communications Protection (SC)..........................................................59

Appendix A.....................................................................................................................................68Minor and External Applications Inventory....................................................................................68

Page 3: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Executive Summary

IntroductionThe purpose of the system security plan (SSP) is to provide an overview of information system security requirements and describe the controls in place or planned to meet those requirements. The SSP also delineates responsibilities and expected behavior of all individuals who access the information system and should be viewed as documentation of the structured process for planning adequate, cost-effective security protection for a major application or general support system. It should reflect input from various managers with responsibilities concerning the information system, including information owner(s), system owner(s), system operator(s), and the information security manager. Additional information may be included in the basic plan, and the structure and format organized according to requirements.

Each SSP is developed in accordance with the guidelines contained in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-18, Guide for Developing Security Plans for Information Technology Systems, and applicable risk mitigation guidance and standards.

This document details the degree to which the RIS/Mediate conforms to recommended federal security controls and the manner in which those controls are implemented.

Intended AudienceThis document is to be used by those parties responsible for managing and/or creating the SSP for an individual general support system or major application. System owners are organizationally responsible for conducting these activities; however, guidance and implementation assistance is frequently provided at an organizational level. Within NIST, guidance to complete the SSP, as well as support for the activities associated with, is provided by the Security Policy and Compliance Section.

RIS/Mediate Caseload Manager SSP SummaryThe RIS/Mediate Caseload Manager is currently categorized as Case Management system and is a legal and records management system. The referenced system has a Moderate FIPS 199 impact level. RIS/Mediate Caseload Manager supports Microsoft Windows, Apple MAC, Linux and all hardware and software platforms that are web enabled.

Resourceful Internet Solutions, Inc. System Security Plan

i

Page 4: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

System Compliance with Security Controls by FamilyThe following table provides a high level summary (by control family) of how The RIS/Mediate Caseload Manager complies with the security controls articulated in NIST 800-53.

NIST 800-53 Control Family Number Met / %

Number Partially Met / %

Number Not Met / %

Number N/A / %

Access Control (AC) 100Awareness & Training (AT) 50 25 25Audit & Accountability (AU) 100Certification, Accreditation, & Security Assessments (CA)

50 50

Configuration Management (CM) 100Contingency Planning (CP) 100Identification and Authentication (IA) 100Incident Response (IR) 90 10Maintenance (MA) 95 4 1Media Protection (MP) 100Physical and Environmental Protection (PE)

100

Planning (PL) 90 10Personnel Security (PS) 100Risk Assessment (RA) 100System and Services Acquisition (SA) 100System and Communications Protection (SC)

100

System and Information Integrity (SI) 100Control Population Totals 91.8% 2.0% 1.5% 4.7%

System Security Plan ApprovalThis SSP was approved on April 25, 2013 by James Melamed, CEO.

Resourceful Internet Solutions, Inc. System Security Plan

ii

Page 5: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

1 System Security PlanThe following sub-sections discuss the process used for RIS/Mediate Caseload Manager system security planning.

1.1 Information System Description and Responsible OrganizationTable 1 provides general information on the RIS/Mediate Caseload Manager.

Table 1. General System InformationSystem Name: RIS/Mediate Caseload ManagerOperational Status: Operational Under Development Major ModificationSystem Type: CM RMS WEB/CLOUD

1.1.1 System CategorizationThe results of the system categorization exercise detailed in this section are summarized below in Table 2. The system processes data types that qualify as moderate impact, and as such, the aggregation factor that addresses the combination of these data types within a single system retains the already set high water mark. In the case of RIS/Mediate Caseload Manager, the aggregation effect holds the system categorization at a moderate impact level.

Table 2. System Impact LevelsConfidentiality Integrity Availability

Cumulative Impact Level Moderate Moderate Moderate

FIPS 199 Categorization Moderate

1.1.2 System Personnel ContactsSystem personnel contacts include contact information for the system owner, authorizing official, other designated contacts, and the division security officer.

System OwnerName: Resourceful Internet Solutions,

Inc.Address: 1355 Oak Street, Ste 201

Eugene, OR 97401Title: James C. Melamed, CEO Phone

Number:541-345-1629

Agency: Mediate.com E-mail Address:

[email protected]

Resourceful Internet Solutions, Inc. System Security Plan

1

Page 6: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Authorizing OfficialName: James Melamed Address: 1355 Oak Street, Ste 201

Eugene, OR 97401Title: CEO/President Phone

Number:541-345-1629

Agency:

Mediate.com E-mail Address:

[email protected]

Information Security Manager (ISM)Name: Byron Knapp Address: 1355 Oak Street, Ste 201

Eugene, OR 97401Title: Systems Admin Phone

Number:541-345-1629

Agency:

Mediate.com E-mail Address:

[email protected]

1.1.3 General System DescriptionThe RIS/Mediate Caseload Manager is a comprehensive, integrated case management system that effectively manages dispute resolution, human service and legal case information while reducing the risk of inaccuracies. Comprehensive features simplify, streamline and coordinate the work of staff, dispute resolution professionals, attorneys, legal departments and government agencies. The following table illustrates the categories and devices supported by RIS/Mediate Caseload Manager:

Table 3. RIS/Mediate Caseload Manager Categories and DevicesCategory Description Managing Division(s)

Software Windows Server 3002 R2 / SP2 Mediate.com / Amazon.comHardware Intel Xeon server Mediate.com / Amazon.comSupporting Devices Mediate.com

The RIS/Mediate Caseload Manager is architected, designed and based around Adobe’s ColdFusion 9 introduces a multitude of productivity enhancing features, deeper integration with the Adobe Flash Platform, and simplified integration with enterprise environments that enable developers to rapidly build enterprise-ready Internet applications.

1.1.4 System Technical EnvironmentThe system technical environment includes:

Microsoft Windows Server 2003 R2 SP2Microsoft SQL Server Adobe Cold Fusion v9SurgeMail

1.1.5 RIS/Mediate Caseload Manager Hardware

Resourceful Internet Solutions, Inc. System Security Plan

2

Page 7: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Amazon EC2 Cloud supporting elastic load and growth balance.

1.1.6 Related Laws, Regulations, and PoliciesThe following provides guidance on generally applicable laws, regulations and SEC policies relevant to The RIS/Mediate Caseload Manager. Including adherence to NIST Security practices.

The Privacy Act of 1974 Computer Security Act of 1987 Paperwork Reduction Act of 1995 Clinger-Cohen Act, Information Technology Management Reform Act of 1996 Presidential Decision Directive 63 (PDD63), May 1998 The Gramm-Leach_Bliley Act OMB Circular A-130 Homeland Security Act of 2002 Sarbanes-Oxley Act of 2002 E-Government Act of 2002 Federal Information Security Management Act (FISMA) of 2002 Homeland Security Presidential Directive – 7, December 2003 Homeland Security Presidential Directive – 12, August 2004 National Institute of Standards and Technology (NIST) Guidance

Resourceful Internet Solutions, Inc. System Security Plan

3

Page 8: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

2 System Security ControlsTable 5 on the next page identifies the security controls applicable to The RIS/Mediate Caseload Manager.

The system security controls are identified by the following convention:

Company-wide security controls = Dark Blue

Controls not required for testing at a moderate baseline = Light Diagonally Down Shaded

System-specific controls = Light Yellow

Resourceful Internet Solutions, Inc. System Security Plan

4

Page 9: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

Table 4. Security Controls Implementation TableR

isk

Ass

essm

ent

Pla

nnin

g

Sys

tem

and

S

ervi

ces

Acq

uisi

tion

Cer

tific

atio

n,

Acc

redi

tatio

n,

and

Sec

urity

A

sses

smen

ts

Per

sonn

el

Sec

urity

Phy

sica

l and

E

nviro

nmen

tal

Pro

tect

ion

Con

tinge

ncy

Pla

nnin

g

Con

figur

atio

n M

anag

emen

t

Mai

nten

ance

Sys

tem

and

In

form

atio

n In

tegr

ity

Med

ia P

rote

ctio

n

Inci

dent

R

espo

nse

Aw

aren

ess

and

Trai

ning

Iden

tific

atio

n an

d A

uthe

ntic

atio

n

Acc

ess

Con

trol

Aud

it an

d A

ccou

ntab

ility

Sys

tem

and

C

omm

unic

atio

ns

Pro

tect

ion

RA-1 PL-1 SA-1 CA-1 PS-1 PE-1 CP-1 CM-1 MA-1 SI-1 MP-1 IR-1 AT-1 IA-1 AC-1 AU-1 SC-1RA-2 PL-2 SA-2 CA-2 PS-2 PE-2 CP-2 CM-2 MA-2 SI-2 MP-2 IR-2 AT-2 IA-2 AC-2 AU-2 SC-2RA-3 PL-3 SA-3 CA-3 PS-3 PE-3 CP-3 CM-3 MA-3 SI-3 MP-3 IR-3 AT-3 IA-3 AC-3 AU-3 SC-3RA-4 PL-4 SA-4 CA-4 PS-4 PE-4 CP-4 CM-4 MA-4 SI-4 MP-4 IR-4 AT-4 IA-4 AC-4 AU-4 SC-4RA-5 PL-5 SA-5 CA-5 PS-5 PE-5 CP-5 CM-5 MA-5 SI-5 MP-5 IR-5 AT-5 IA-5 AC-5 AU-5 SC-5

PL-6 SA-6 CA-6 PS-6 PE-6 CP-6 CM-6 MA-6 SI-6 MP-6 IR-6 IA-6 AC-6 AU-6 SC-6SA-7 CA-7 PS-7 PE-7 CP-7 CM-7 SI-7 MP-7 IR-7 IA-7 AC-7 AU-7 SC-7SA-8 PS-8 PE-8 CP-8 CM-8 SI-8 AC-8 AU-8 SC-8SA-9 PE-9 CP-9 SI-9 AC-9 AU-9 SC-9SA-10 PE-10 CP-10 SI-10 AC-10 AU-10 SC-10SA-11 PE-11 SI-11 AC-11 AU-11 SC-11

PE-12 SI-12 AC-12 SC-12PE-13 AC-13 SC-13PE-14 AC-14 SC-14PE-15 AC-15 SC-15PE-16 AC-16 SC-16PE-17 AC-17 SC-17PE-18 AC-18 SC-18PE-19 AC-19 SC-19

AC-20 SC-20SC-21SC-22SC-23

5

Page 10: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1 RIS/Mediate Caseload Manager Security Control Requirements & Implementation Details

Each security control section is organized as follows: Security Control Header: This section provides the name of the security control

discussed. Example: PL-1, Security Planning Policy and Procedures.

Security Control Requirement: This section provides a detailed description of the security control requirement as stated in NIST 800-53 and tailored to RIS/Mediate and documented policy and specification.

Security Control Implementation Details: This section provides a detailed description of how the security control requirement is implemented. This section states whether the security control has been:

Met – the control has been fully applied and the control requirements have been fully met.

Partially Met – the control has been partially applied and some aspects of the control requirements have not been met. Controls that are partially met will either have an associated Planned Security Controls section or a Compensating Security Controls section.

Not Met – the control has not been applied and the control requirements are not met. Security controls that have “Not Met” designation are documented in the Plan of Actions and Milestones (POA&M). Not met controls can have a Planned Security Controls section or a Compensating Security Controls section.

Not Applicable – the control does not directly apply to the information system. The system either does not perform the functions described by the control, or does not posess the technology for which the control is required (ex., portable and mobile device restrictions for a system without any laptops, personal digital assistant (PDA), etc.).

Planned Security Controls: This section provides a discussion of any planned control implementation to address partially met or not met controls.

Compensating Security Controls: This section provides a discussion of compensating security controls for partially met or not met requirements that provide an equivalent security capability or level of protection for the information system. Upon verification and residual risk assessment of the compensating controls through the ST&E and risk assessment tasks, the authorizing official approves these controls for the information system.

Company-wide Security Controls: Controls that are typically standard for all systems across the company. These are controls that all systems or applications at RIS/Mediate have in common.

6

Resourceful Internet Solutions, Inc. System Security Plan

Page 11: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

System control compliance is detailed in the following format structure:

SECURITY CONTROL IMPLEMENTATION STRUCTURE:

RIS/Mediate Caseload Manager v3.1 NIST System Contol and ProceduresSecurity Control Requirement:

Text of 800-53 Control Requirement

Security Control Implementation Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Once granted access, users are limited to authorized activities only; i.e., customers are prevented from accessing either applications or data that belong to other customers.

Planned Security Control:Non Applicable – Review scheduled for Q2 2014

Compensating Security Control:Non Applicable

2.1.12.1.1 Risk Assessment (RA)Risk Assessment (RA)

RA-1 Risk Assessment Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

7

Resourceful Internet Solutions, Inc. System Security Plan

Page 12: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

RA-2 Security CategorizationSecurity Control Requirement:

The organization categorizes the information system and the information processed, stored, or transmitted by the system in accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance and documents the results (including supporting rationale) in the system security plan. Designated senior-level officials within the organization review and approve the security categorizations.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Once granted access, users are limited to authorized activities only; i.e., customers are prevented from accessing either applications or data that belong to other customers.

Planned Security Control:Non Applicable – Review scheduled for Q2 2014

Compensating Security Control:Non Applicable

RA-3 Risk AssessmentSecurity Control Requirement:

The organization conducts assessments of the risk and magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the agency (including information and information systems managed/operated by external parties).

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate reviews and conducts quarterly security audits from a 3rd party vendor. Any new findings are immediately review and addressed.

Planned Security Control:Non Applicable – Review scheduled for Q2 2014

Compensating Security Control:Non Applicable

8

Resourceful Internet Solutions, Inc. System Security Plan

Page 13: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

RA-4 Risk Assessment UpdateSecurity Control Requirement:

The organization updates the risk assessment every three years or whenever there are significant changes to the information system, the facilities where the system resides, or other conditions that may impact the security or accreditation status of the system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate reviews and conducts quarterly security audits from a 3rd party vendor. Any new findings are immediately review and addressed.

Planned Security Control:Non Applicable – Review scheduled for Q4 2013

Compensating Security Control:Non Applicable

RA-5 Vulnerability ScanningSecurity Control Requirement:

The organization scans for vulnerabilities in the information system monthly or when significant new vulnerabilities potentially affecting the system are identified and reported.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

RIS/Mediate conducts 3rd party audit every quarter.

2.1.22.1.2 Planning (PL)Planning (PL)

PL-1 Security Planning Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the security planning policy and associated security planning controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

RIS/Mediate conducts 3rd party security audits every quarter. These are confidential and

9

Resourceful Internet Solutions, Inc. System Security Plan

Page 14: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

normally internal documents.

PL-2 System Security PlanSecurity Control Requirement:

The organization develops and implements a security plan for the information system that provides an overview of the security requirements for the system and a description of the security controls in place or planned for meeting those requirements. Designated officials within the organization review and approve the plan.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate build security into the core foundation of our system, starting at the hardware levels through software and applications layers. RIS/Mediate reviews it security plan bi-annually.

Planned Security Control:Non Applicable – Review scheduled for Q4 2013

Compensating Security Control:Non Applicable

PL-3 System Security Plan UpdateSecurity Control Requirement:

The organization reviews the security plan for the information system bi-annually and revises the plan to address system/organizational changes or problems identified during plan implementation or security control assessments.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Yes – RIS/Mediate just conducted a security audit in April 2013

Planned Security Control:Non Applicable – Review scheduled for Q2 2014

Compensating Security Control:Non Applicable

10

Resourceful Internet Solutions, Inc. System Security Plan

Page 15: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PL-4 Rules of BehaviorSecurity Control Requirement:

The organization establishes and makes readily available to all information system users a set of rules that describes their responsibilities and expected behavior with regard to information and information system usage. The organization receives signed acknowledgement from users indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to the information system and its resident information.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Pending – RIS/Mediate is identifing new responsibilities and assignments.

PL-5 Privacy Impact AssessmentSecurity Control Requirement:

The organization conducts a privacy impact assessment on the information system in accordance with OMB policy.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

11

Resourceful Internet Solutions, Inc. System Security Plan

Page 16: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PL-6 Security-Related Activity PlanningSecurity Control Requirement:

The organization plans and coordinates security-related activities affecting the information system before conducting such activities in order to reduce the impact on organizational operations (i.e., mission, functions, image, and reputation), organizational assets, and individuals.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate designed and built this application with security as the focal point.

Planned Security Control:Non Applicable – Review scheduled for Q2 2014

Compensating Security Control:Non Applicable

2.1.32.1.3 System and Services Acquisition (SA)System and Services Acquisition (SA)

SA-1 System and Services Acquisition Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, system and services acquisition policy that includes information security considerations and that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

12

Resourceful Internet Solutions, Inc. System Security Plan

Page 17: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SA-2 Allocation of ResourcesSecurity Control Requirement:

The organization determines, documents, and allocates as part of its capital planning and investment control process, the resources required to adequately protect the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SA-3 Life-Cycle SupportSecurity Control Requirement:

The organization manages the information system using a system development life cycle methodology that includes information security considerations.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Amazon S3 and EC2 expandible Cloud Services

SA-4 AcquisitionsSecurity Control Requirement:

The organization includes security requirements and/or security specifications, either explicitly or by reference, in information system acquisition contracts based on an assessment of risk and in accordance with applicable laws, Executive Orders, directives, policies, regulations, and standards.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Planned review in Q2 2012

13

Resourceful Internet Solutions, Inc. System Security Plan

Page 18: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SA-5 Information System DocumentationSecurity Control Requirement:

The organization obtains, protects as required, and makes available to authorized personnel, adequate documentation for the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:The RIS/Mediate Caseload Manager is a production planform and new features as added on a regular basis either by request or as part of a larger audit or finding.

Planned Security Control:Non Applicable – Review scheduled for Q4 2013

Compensating Security Control:Non Applicable

SA-6 Software Usage RestrictionsSecurity Control Requirement:

The organization complies with software usage restrictions.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SA-7 User Installed SoftwareSecurity Control Requirement:

The organization enforces explicit rules governing the installation of software by users.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

RIS/Mediate does not allow users to install programs and/or software.

14

Resourceful Internet Solutions, Inc. System Security Plan

Page 19: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SA-8 Security Engineering PrinciplesSecurity Control Requirement:

The organization designs and implements the information system using security engineering principles.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate designed Caseload Manager from the ground up using best practices and principles.

Planned Security Control:Non Applicable – Review scheduled for Q2 2014

Compensating Security Control:Non Applicable

SA-9 External Information System ServicesSecurity Control Requirement:

The organization: (i) requires that providers of external information system services employ adequate security controls in accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, guidance, and established service-level agreements; and (ii) monitors security control compliance.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

15

Resourceful Internet Solutions, Inc. System Security Plan

Page 20: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SA-11 Developer Security TestingSecurity Control Requirement:

The organization requires that information system developers create a security test and evaluation plan, implement the plan, and document the results.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

2.1.42.1.4 Certification, Accreditation, and Security Assessments (CA)Certification, Accreditation, and Security Assessments (CA)

CA-1 Certification, Accreditation, and Security Assessment Policies and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) formal, documented, security assessment and certification and accreditation policies that address purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documentedprocedures to facilitate the implementation of the security assessment andcertification and accreditation policies and associated assessment, certification, and accreditation controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Review in Q1 2014

16

Resourceful Internet Solutions, Inc. System Security Plan

Page 21: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CA-2 Security AssessmentsSecurity Control Requirement:

The organization conducts an assessment of the security controls in the information system at least annually to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate conducts quarterly 3rd party security audits then reviews and implements as needed

Planned Security Control:Next Audit due in Q4 2013

Compensating Security Control:Non Applicable

CA-3 Information System ConnectionsSecurity Control Requirement:

The organization authorizes all connections from the information system to other information systems outside of the accreditation boundary through the use of system connection agreements and monitors/controls the system connections on an ongoing basis.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:All of RIS/Mediate controls and data are internal and do not extend past RIS/Mediate boundries.

Planned Security Control:Non Applicable

Compensating Security Control:Non Applicable

17

Resourceful Internet Solutions, Inc. System Security Plan

Page 22: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CA-4 Security CertificationSecurity Control Requirement:

The organization conducts an assessment of the security controls in the information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CA-5 Plan of Action and MilestonesSecurity Control Requirement:

The organization develops and updates on a monthly basis, a plan of action and milestones for the information system that documents the organization’s planned, implemented, and evaluated remedial actions to correct deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CA-6 Security AccreditationSecurity Control Requirement:

The organization authorizes (i.e., accredits) the information system for processing before operations and updates the authorization at least every three years or when there is a significant change to the system. A senior organizational official signs and approves the security accreditation.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

18

Resourceful Internet Solutions, Inc. System Security Plan

Page 23: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CA-7 Continuous MonitoringSecurity Control Requirement:

The organization monitors the security controls in the information system on an ongoing basis.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

2.1.52.1.5 Personnel Security (PS)Personnel Security (PS)

PS-1 Personnel Security Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the personnel security policy and associated personnel security controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PS-2 Position CategorizationSecurity Control Requirement:

The organization assigns a risk designation to all positions and establishes screening criteria for individuals filling those positions. The organization reviews and revises position risk designations every five years for all personnel requiring access to information system resources.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

19

Resourceful Internet Solutions, Inc. System Security Plan

Page 24: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PS-3 Personnel ScreeningSecurity Control Requirement:

The organization screens individuals requiring access to organizational information and information systems before authorizing access.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PS-4 Personnel TerminationSecurity Control Requirement:

The organization, upon termination of individual employment, terminates information system access, conducts exit interviews, retrieves all organizational information system-related property, and provides appropriate personnel with access to official records created by the terminated employee that are stored on organizational information systems.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PS-5 Personnel TransferSecurity Control Requirement:

The organization reviews information systems/facilities access authorizations when personnel are reassigned or transferred to other positions within the organization and initiates appropriate actions.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

20

Resourceful Internet Solutions, Inc. System Security Plan

Page 25: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PS-6 Access AgreementsSecurity Control Requirement:

The organization completes appropriate signed access agreements for individuals requiring access to organizational information and information systems before authorizing access and reviews/updates the agreements annually.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PS-7 Third-Party Personnel SecuritySecurity Control Requirement:

The organization establishes personnel security requirements including security roles and responsibilities for third-party providers and monitors provider compliance.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PS-8 Personnel SanctionsSecurity Control Requirement:

The organization employs a formal sanctions process for personnel failing to comply with established information security policies and procedures.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

2.1.62.1.6 Physical and Environmental Protection (PE)Physical and Environmental Protection (PE)

PE-1 Physical and Environmental Protection Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the physical and environmental protection policy andassociated physical and environmental protection controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

21

Resourceful Internet Solutions, Inc. System Security Plan

Page 26: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PE-2 Physical Access AuthorizationsSecurity Control Requirement:

The organization develops and keeps current a list of personnel with authorized access to the facility where the information system resides (except for those areas within the facility officially designated as publicly accessible) and issues appropriate authorization credentials. Designated officials within the organization review and approve the access list and authorization credentials annually.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-3 Physical Access ControlSecurity Control Requirement:

The organization controls all physical access points (including designated entry/exit points) to the facility where the information system resides (except for those areas within the facility officially designated as publicly accessible) and verifies individual access authorizations before granting access to the facility. The organization controls access to areas officially designated as publicly accessible, as appropriate, in accordance with the organization’s assessment of risk.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-5 Access Control for Display MediumSecurity Control Requirement:

The organization controls physical access to information system devices that display information to prevent unauthorized individuals from observing the display output.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-6 Monitoring Physical AccessSecurity Control Requirement:

The organization monitors physical access to the information system to detect and respond to physical security incidents.

22

Resourceful Internet Solutions, Inc. System Security Plan

Page 27: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-7 Visitor ControlSecurity Control Requirement:

The organization controls physical access to the information system by authenticating visitors before authorizing access to the facility where the information system resides other than areas designated as publicly accessible.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-8 Access LogsSecurity Control Requirement:

The organization maintains visitor access records to the facility where the information system resides (except for those areas within the facility officially designated as publicly accessible) that includes: (i) name and organization of the person visiting; (ii) signature of the visitor; (iii) form of identification; (iv) date of access; (v) time of entry and departure; (vi) purpose of visit; and (vii) name and organization of person visited. Designated officials within the organization review the visitor access records daily.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-9 Power Equipment and Power CablingSecurity Control Requirement:

The organization protects power equipment and power cabling for the information system from damage and destruction.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

23

Resourceful Internet Solutions, Inc. System Security Plan

Page 28: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PE-10 Emergency ShutoffSecurity Control Requirement:

The organization provides, for specific locations within a facility containing concentrations of information system resources, the capability of shutting off power to any information system component that may be malfunctioning or threatened without endangering personnel by requiring them to approach the equipment.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-11 Emergency PowerSecurity Control Requirement:

The organization provides a short-term uninterruptible power supply to facilitate an orderly shutdown of the information system in the event of a primary power source loss.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-12 Emergency LightingSecurity Control Requirement:

The organization employs and maintains automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-13 Fire ProtectionSecurity Control Requirement:

The organization employs and maintains fire suppression and detection devices/systems that can be activated in the event of a fire.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

24

Resourceful Internet Solutions, Inc. System Security Plan

Page 29: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PE-14 Temperature & Humidity ControlsSecurity Control Requirement:

The organization regularly maintains, within acceptable levels, and monitors the temperature and humidity within the facility where the information system resides.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-15 Water Damage ProtectionSecurity Control Requirement:

The organization protects the information system from water damage resulting from broken plumbing lines or other sources of water leakage by ensuring that master shutoff valves are accessible, working properly, and known to key personnel.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-16 Delivery and RemovalSecurity Control Requirement:

The organization authorizes and controls information system-related items entering and exiting the facility and maintains appropriate records of those items.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

PE-17 Alternate Work SiteSecurity Control Requirement:

The organization employs appropriate management, operational, and technical information system security controls at alternate work sites.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

25

Resourceful Internet Solutions, Inc. System Security Plan

Page 30: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

PE-18 Location of Information System ComponentsSecurity Control Requirement:

The organization positions information system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

2.1.72.1.7 Contingency Planning (CP)Contingency Planning (CP)

CP-1 Contingency Planning Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the contingency planning policy and associated contingency planningcontrols.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

26

Resourceful Internet Solutions, Inc. System Security Plan

Page 31: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CP-2 Contingency PlanSecurity Control Requirement:

The organization develops and implements a contingency plan for the information system addressing contingency roles, responsibilities, assigned individuals with contact information, and activities associated with restoring the system after a disruption or failure. Designated officials within the organization review and approve the contingency plan and distribute copies of the plan to key contingency personnel.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate maintains a disaster recovery and contingency plan. This plan is review bi-annually.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

CP-3 Contingency TrainingSecurity Control Requirement:

The organization trains personnel in their contingency roles and responsibilities with respect to the information system and provides refresher training annually.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate maintains a disaster recovery and contingency plan. This plan is review bi-annually. All personnal are trained and informed of their specific role.

Planned Security Control:Non Applicable – review in Q2 2014 or as new personnel roles are added.

Compensating Security Control:Non Applicable

27

Resourceful Internet Solutions, Inc. System Security Plan

Page 32: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CP-4 Contingency Plan Testing and ExercisesSecurity Control Requirement:

The organization: (i) tests and/or exercises the contingency plan for the information system least annually using organizational elements responsible for related plans (e.g., Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan) at the alternate processing site to determine the plan’s effectiveness and the organization’s readiness to execute the plan; and (ii) reviews the contingency plan test/exercise results and initiates corrective actions.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CP-5 Contingency Plan UpdateSecurity Control Requirement:

The organization reviews the contingency plan for the information system annually and revises the plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate reviews contingency/disaster recovery plans as needed and on a bi-annual basis

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control: Non Applicable – review in Q2 2014

CP-6 Alternate Storage SiteSecurity Control Requirement:

The organization identifies an alternate storage site and initiates necessary agreements to permit the storage of information system backup information.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

28

Resourceful Internet Solutions, Inc. System Security Plan

Page 33: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CP-7 Alternate Processing SiteSecurity Control Requirement:

The organization identifies an alternate processing site and initiates necessary agreements to permit the resumption of information system operations for critical mission/business functions within 24/48 hours when the primary processing capabilities are unavailable.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CP-8 Telecommunications ServicesSecurity Control Requirement:

The organization identifies primary and alternate telecommunications services to support the information system and initiates necessary agreements to permit the resumption of system operations for critical mission/business functions within 24 hours when the primary telecommunications capabilities are unavailable.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CP-9 Information System BackupSecurity Control Requirement:

The organization conducts backups of user-level and system-level information (including system state information) contained in the information system weekly and protects backup information at the storage location.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CP-10 Information System Recovery and ReconstitutionSecurity Control Requirement:

The organization employs mechanisms with supporting procedures to allow the information system to be recovered and reconstituted to a known secure state after a disruption or failure.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

29

Resourceful Internet Solutions, Inc. System Security Plan

Page 34: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1.82.1.8 Configuration Management (CM)Configuration Management (CM)

CM-1 Configuration Management Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

CM-2 Baseline ConfigurationSecurity Control Requirement:

The organization develops, documents, and maintains a current baseline configuration of the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate reviews baseline configurations quarterly and makes any adjustments accordingly.

Planned Security Control:Non Applicable

Compensating Security Control:Non Applicable

30

Resourceful Internet Solutions, Inc. System Security Plan

Page 35: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CM-3 Configuration Change ControlSecurity Control Requirement:

The organization authorizes, documents, and controls changes to the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate plans, reviews and documents all system changes.

Planned Security Control:Non Applicable

Compensating Security Control:Non Applicable

CM-4 Monitoring Configuration ChangesSecurity Control Requirement:

The organization monitors changes to the information system conducting security impact analyses to determine the effects of the changes.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate has a change management process to track and monitor all changes to the system.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

31

Resourceful Internet Solutions, Inc. System Security Plan

Page 36: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CM-5 Access Restrictions for ChangeSecurity Control Requirement:

The organization: (i) approves individual access privileges and enforces physical and logical access restrictions associated with changes to the information system; and (ii) generates, retains, and reviews records reflecting all such changes.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details

RIS/Mediate restricts access priviledges to only Key personnel.

Planned Security Control:Non Applicable – review in Q1 2014

Compensating Security Control:Non Applicable

CM-6 Configuration SettingsSecurity Control Requirement:

The organization: (i) establishes mandatory configuration settings for information technology products employed within the information system; (ii) configures the security settings of information technology products to the most restrictive mode consistent with operational requirements; (iii) documents the configuration settings; and (iv) enforces the configuration settings in all components of the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate restricts access priviledges to only Key personnel. These personnel record all changes for historical purposes.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

32

Resourceful Internet Solutions, Inc. System Security Plan

Page 37: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

CM-7 Least FunctionalitySecurity Control Requirement:

The organization configures the information system to provide only essential capabilities and specifically prohibits and/or restricts the use of unnecessary functions, ports, protocols, and/or services.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate uses best practices and follows strict guidelines pertaining to infrastructure and systems. Only essential ports are opened with MAC access or IP authenitcaion enabled.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

CM-8 Information System Component InventorySecurity Control Requirement:

The organization develops, documents, and maintains a current inventory of the components of the information system and relevant ownership information.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate conducts inventory assessments on a quarterly basis.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

33

Resourceful Internet Solutions, Inc. System Security Plan

Page 38: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1.92.1.9 Maintenance (MA)Maintenance (MA)

MA-1 System Maintenance Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, information system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate theimplementation of the information system maintenance policy and associated system maintenance controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

MA-2 Controlled MaintenanceSecurity Control Requirement:

The organization schedules, performs, documents, and reviews records of routine preventative and regular maintenance (including repairs) on the components of the information system in accordance with manufacturer or vendor specifications and/or organizational requirements.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs Amazon Clouds services for hardware and Operating Systems. All updates, repairs or upgrades can be conducted on the fly while the system is active. There are only a couple instances that a reboot may be ordered.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

34

Resourceful Internet Solutions, Inc. System Security Plan

Page 39: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

MA-3 Maintenance ToolsSecurity Control Requirement:

The organization approves, controls, and monitors the use of information system maintenance tools and maintains the tools on an ongoing basis.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

MA-4 Remote MaintenanceSecurity Control Requirement:

The organization authorizes, monitors, and controls any remotely executed maintenance and diagnostic activities, if employed.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

MA-5 Maintenance PersonnelSecurity Control Requirement:

The organization allows only authorized personnel to perform maintenance on the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate grants only key personnel access to the core systems.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

35

Resourceful Internet Solutions, Inc. System Security Plan

Page 40: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

MA-6 Timely MaintenanceSecurity Control Requirement:

The organization obtains maintenance support and spare parts for high availability servers within 24 hours of failure.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs Amazon Clouds services for hardware and Operating Systems. All updates, repairs or upgrades can be conducted on the fly while the system is active. There are only a couple instances that a reboot may be ordered.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

2.1.102.1.10 System and Information Integrity (SI)System and Information Integrity (SI)

SI-1 System and Information Integrity Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate theimplementation of the system and information integrity policy and associated system and information integrity controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

36

Resourceful Internet Solutions, Inc. System Security Plan

Page 41: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SI-2 Flaw RemediationSecurity Control Requirement:

The organization identifies, reports, and corrects information system flaws.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs a bug tracking system and full-time staff to monitor, review and implement flaws and/or bugs as needed.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

SI-3 Malicious Code ProtectionSecurity Control Requirement:

The information system implements malicious code protection.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SI-4 Information System Monitoring Tools and TechniquesSecurity Control Requirement:

The organization employs tools and techniques to monitor events on the information system, detect attacks, and provide identification of unauthorized use of the system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

37

Resourceful Internet Solutions, Inc. System Security Plan

Page 42: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SI-5 Security Alerts and AdvisoriesSecurity Control Requirement:

The organization receives information system security alerts/advisories on a regular basis, issues alerts/advisories to appropriate personnel, and takes appropriate actions in response.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SI-8 Spam ProtectionSecurity Control Requirement:

The information system implements spam protection.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

RIS/Mediate is is the process of reviewing additional email systems and spam protection.

SI-9 Information Input RestrictionsSecurity Control Requirement:

The organization restricts the capability to input information to the information system to authorized personnel.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate grants only key personnel access to the core systems.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

38

Resourceful Internet Solutions, Inc. System Security Plan

Page 43: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SI-10 Information Accuracy, Completeness, Validity, and AuthenticitySecurity Control Requirement:

The information system checks information for accuracy, completeness, validity, and authenticity.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SI-11 Error HandlingSecurity Control Requirement:

The information system identifies and handles error conditions in an expeditious manner without providing information that could be exploited by adversaries.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SI-12 Information Output Handling and RetentionSecurity Control Requirement:

The organization handles and retains output from the information system in accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

39

Resourceful Internet Solutions, Inc. System Security Plan

Page 44: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1.112.1.11 Media Protection (MP)Media Protection (MP)

MP-1 Media Protection Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the media protection policy and associated media protection controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

MP-2 Media AccessSecurity Control Requirement:

The organization authorizes, monitors, and controls any remotely executed maintenance and diagnostic activities, if employed.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

40

Resourceful Internet Solutions, Inc. System Security Plan

Page 45: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

MP-4 Media StorageSecurity Control Requirement:

The organization physically controls and securely stores information system media within controlled areas.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

MP-5 Media TransportSecurity Control Requirement:

The organization protects and controls information system media during transport outside of controlled areas and restricts the activities associated with transport of such media to authorized personnel.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

MP-6 Media Sanitization and DisposalSecurity Control Requirement:

The organization sanitizes information system media, both digital and non-digital, prior to disposal or release for reuse.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

41

Resourceful Internet Solutions, Inc. System Security Plan

Page 46: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1.122.1.12 Incident Response (IR)Incident Response (IR)

IR-1 Incident Response Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IR-2 Incident Response TrainingSecurity Control Requirement:

The organization trains personnel in their incident response roles and responsibilities with respect to the information system and provides refresher training annually.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IR-3 Incident Response Testing and ExercisesSecurity Control Requirement:

The organization tests and/or exercises the incident response capability for the information system least annually using automated mechanisms to determine the incident response effectiveness and documents the results.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

42

Resourceful Internet Solutions, Inc. System Security Plan

Page 47: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

IR-4 Incident HandlingSecurity Control Requirement:

The organization implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IR-5 Incident MonitoringSecurity Control Requirement:

The organization tracks and documents information system security incidents on an ongoing basis.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IR-6 Incident ReportingSecurity Control Requirement:

The organization promptly reports incident information to appropriate authorities.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IR-7 Incident Response AssistanceSecurity Control Requirement:

The organization provides an incident response support resource that offers advice and assistance to users of the information system for the handling and reporting of security incidents. The support resource is an integral part of the organization’s incident response capability.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

2.1.132.1.13 Awareness and Training (AT)Awareness and Training (AT)

43

Resourceful Internet Solutions, Inc. System Security Plan

Page 48: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AT-1 Security Awareness and Training Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the security awareness and training policy and associated securityawareness and training controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

AT-2 Security AwarenessSecurity Control Requirement:

The organization provides basic security awareness training to all information system users (including managers and senior executives) before authorizing access to the system, when required by system changes, and [Assignment: organization-defined frequency, at least annually] thereafter.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

44

Resourceful Internet Solutions, Inc. System Security Plan

Page 49: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AT-3 Security TrainingSecurity Control Requirement:

The organization identifies personnel that have significant information system security roles and responsibilities during the system development life cycle, documents those roles and responsibilities, and provides appropriate information system security training: (i) before authorizing access to the system or performing assigned duties; (ii) when required by system changes; and (iii) annually thereafter.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs project plans and uses strict guidelines when updating or upgrading systems. Project Managers, Team Leads and other roles are assigned appropreiately.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AT-4 Security Training RecordsSecurity Control Requirement:

The organization documents and monitors individual information system security training activities including basic security awareness training and specific information system security training.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate conducts training and roles analysis on core systems, applications and email systems.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

45

Resourceful Internet Solutions, Inc. System Security Plan

Page 50: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1.14 Identification and Authentication (IA)

IA-1 Identification and Authentication Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate theimplementation of the identification and authentication policy and associated identification and authentication controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IA-2 User Identification and AuthenticationSecurity Control Requirement:

The information system uniquely identifies and authenticates users (or processes acting on behalf of users).

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Once granted access, users are limited to authorized activities only; i.e., customers are prevented from accessing either applications or data that belong to other customers. No data to/from other clients is accessible , and no internal data is accessible to non-designated staff.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

IA-3 Device and Host Identification and AuthenticationSecurity Control Requirement:

The information system identifies and authenticates specific devices before establishing a connection.

Security Control Implementation Details: Met Partially Met Not Met N/A Common ControlPLEASE ADDRESS ONE OF THE FOLLOWING THREE AREAS (WHERE APPLICABLE) AND PROVIDE EXPLANATIONS ACCORDINGLY

46

Resourceful Internet Solutions, Inc. System Security Plan

Page 51: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

IA-4 Identifier ManagementSecurity Control Requirement:

The organization manages user identifiers by: (i) uniquely identifying each user; (ii) verifying the identity of each user; (iii) receiving authorization to issue a user identifier from an appropriate organization official; (iv) issuing the user identifier to the intended party; (v) disabling the user identifier after 120 days of inactivity; and (vi) archiving user identifiers.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IA-5 Authenticator ManagementSecurity Control Requirement:

The organization manages information system authenticators by: (i) defining initial authenticator content; (ii) establishing administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators; (iii) changing default authenticators upon information system installation; and (iv) changing/refreshing authenticators periodically.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

IA-6 Authenticator FeedbackSecurity Control Requirement:

The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate secures all data via , Secure Socket Layers (SSL), encrytion and password protection.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

47

Resourceful Internet Solutions, Inc. System Security Plan

Page 52: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

IA-7 Cryptographic Module AuthenticationSecurity Control Requirement:

The information system employs authentication methods that meet the requirements of applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate secures all data via , Secure Socket Layers (SSL), encrytion and password protection.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

2.1.152.1.15 Access Control (AC)Access Control (AC)

AC-1 Access Control Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the access control policy and associated access controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

48

Resourceful Internet Solutions, Inc. System Security Plan

Page 53: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-2 Account ManagementSecurity Control Requirement:

The organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts. The organization reviews information system accounts on a monthly basis.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate has built an account/user module that permits modifying, reveiwing, disabling and removal of accounts.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AC-3 Access EnforcementSecurity Control Requirement:

The information system enforces assigned authorizations for controlling access to the system in accordance with applicable policy.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Once granted access, users are limited to authorized activities only; i.e., customers are prevented from accessing either applications or data that belong to other customers. No data to/from other clients is accessible , and no internal data is accessible to non-designated staff.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

49

Resourceful Internet Solutions, Inc. System Security Plan

Page 54: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-4 Information Flow EnforcementSecurity Control Requirement:

The information system enforces assigned authorizations for controlling the flow of information within the system and between interconnected systems in accordance with applicable policy.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Data “in motion,” including user authentication information and credentials, are encrypted

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AC-5 Separation of DutiesSecurity Control Requirement:

The information system enforces separation of duties through assigned access authorizations.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Once granted access, users are limited to authorized activities only; i.e., customers are prevented from accessing either applications or data that belong to other customers. No data to/from other clients is accessible , and no internal data is accessible to non-designated staff.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

50

Resourceful Internet Solutions, Inc. System Security Plan

Page 55: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-6 Least PrivilegeSecurity Control Requirement:

The information system enforces the most restrictive set of rights/privileges or accesses needed by users (or processes acting on behalf of users) for the performance of specified tasks.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate adheres to strict guidelines and follows NIST recommendations when addressing user data, the flow and storage of that data.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AC-7 Unsuccessful Logon AttemptsSecurity Control Requirement:

The information system enforces a limit of five consecutive invalid access attempts by a user during a 24 hour time period. The information system automatically locks the account/node in perpetuity when the maximum number of unsuccessful attempts is exceeded.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate currently guards against password-guessing and brute-force attempts, the company must lock a user’s account after 5 unsuccessful logins.

Planned Security Control:Non Applicable – review in Q4 2013 – RIS/Mediate is reviewing whether this should be implemented as a time-based lockout or remain a manual reset.

Compensating Security Control:Non Applicable

51

Resourceful Internet Solutions, Inc. System Security Plan

Page 56: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-8 System Use NotificationSecurity Control Requirement:

The information system displays an approved, system use notification message before granting system access informing potential users: (i) that the user is accessing a U.S. Government information system; (ii) that system usage may be monitored, recorded, and subject to audit; (iii) that unauthorized use of the system is prohibited and subject tocriminal and civil penalties; and (iv) that use of the system indicates consent to monitoring and recording. The system use notification message provides appropriate privacy and security notices (based on associated privacy and security policies or summaries) and remains on the screen until the user takes explicit actions to log on to the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate is currently reviewing this requirement and ways to implement it.

Planned Security Control:Non Applicable – review in Q4 2013

Compensating Security Control:Non Applicable

AC-11 Session LockSecurity Control Requirement:

The information system prevents further access to the system by initiating a session lock after 20 minutes of inactivity, and the session lock remains in effect until the user reestablishes access using appropriate identification and authentication procedures.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:In order to save on bandwidth and Secure Socket Layers (SSL) sessions, RIS/Mediate does time-out session that meet appropreiate critreia.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

52

Resourceful Internet Solutions, Inc. System Security Plan

Page 57: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-12 Session TerminationSecurity Control Requirement:

The information system automatically terminates a remote session after 20 minutes of inactivity.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:In order to save on bandwidth and Secure Socket Layers (SSL) sessions, RIS/Mediate does time-out session that meet appropreiate critreia.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AC-13 Supervision and Review—Access ControlSecurity Control Requirement:

The organization supervises and reviews the activities of users with respect to the enforcement and usage of information system access controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

AC-14 Permitted Actions without Identification or AuthenticationSecurity Control Requirement:

The organization identifies and documents specific user actions that can be performed on the information system without identification or authentication.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

53

Resourceful Internet Solutions, Inc. System Security Plan

Page 58: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-17 Remote AccessSecurity Control Requirement:

The organization authorizes, monitors, and controls all methods of remote access to the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate strictly limits remote access to the system from pre-defined locations and MAC addresses with appropreiate login credidentials.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AC-18 Wireless Access RestrictionsSecurity Control Requirement:

The organization: (i) establishes usage restrictions and implementation guidance for wireless technologies; and (ii) authorizes, monitors, controls wireless access to the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Wireless access is not premitted to the system.

AC-19 Access Control for Portable and Mobile DevicesSecurity Control Requirement:

The organization: (i) establishes usage restrictions and implementation guidance for organization-controlled portable and mobile devices; and (ii) authorizes, monitors, and controls device access to organizational information systems.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

54

Resourceful Internet Solutions, Inc. System Security Plan

Page 59: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AC-20 Use of External Information SystemsSecurity Control Requirement:

The organization establishes terms and conditions for authorized individuals to: (i) access the information system from an external information system; and (ii) process, store, and/or transmit organization-controlled information using an external information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

2.1.162.1.16 Audit and Accountability (AU)Audit and Accountability (AU)

AU-1 Audit and Accountability Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

AU-2 Auditable EventsSecurity Control Requirement:

The information system generates audit records for the following events: 1) All user access attempts to the system, 2) Modification of sensitive system information, 3) Additions of new users, 4) Deletions of users, 5) Changes to user privileges, 6) Changes to system security settings, 7) Direct user changes to system data (not facilitated by the application).

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate regularly monitors and reviews all logs and records daily.

Planned Security Control:Non Applicable

Compensating Security Control:Non Applicable

55

Resourceful Internet Solutions, Inc. System Security Plan

Page 60: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AU-3 Content of Audit RecordsSecurity Control Requirement:

The information system produces audit records that contain sufficient information to establish what events occurred, the sources of the events, and the outcomes of the events.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate regularly monitors and reviews all logs and records daily. Events are further investigated when suspious activity is noticed.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AU-4 Audit Storage CapacitySecurity Control Requirement:

The organization allocates sufficient audit record storage capacity and configures auditing to reduce the likelihood of such capacity being exceeded.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

AU-5 Response to Audit Processing FailuresSecurity Control Requirement:

The information system alerts appropriate organizational officials in the event of an audit processing failure and takes the following additional actions: ceases information system processing.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

56

Resourceful Internet Solutions, Inc. System Security Plan

Page 61: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AU-6 Audit Monitoring, Analysis, and ReportingSecurity Control Requirement:

The organization regularly reviews/analyzes information system audit records for indications of inappropriate or unusual activity, investigates suspicious activity or suspected violations, reports findings to appropriate officials, and takes necessary actions.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate regularly monitors and reviews all logs and records daily. Events are further investigated when suspious activity is noticed.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AU-7 Audit Reduction and Report GenerationSecurity Control Requirement:

The information system provides an audit reduction and report generation capability.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:In order to it it’s part and help the environment, RIS/Mediate only uses digitial online reports

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AU-8 Time StampsSecurity Control Requirement:

The information system provides time stamps for use in audit record generation.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

57

Resourceful Internet Solutions, Inc. System Security Plan

Page 62: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

AU-9 Protection of Audit InformationSecurity Control Requirement:

The information system protects audit information and audit tools from unauthorized access, modification, and deletion.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate only authorizes key personnel access to audit information and tools.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

AU-11 Audit Record RetentionSecurity Control Requirement:

The organization retains audit records for one year to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.

Security Control Implementation Details: Met Partially Met Not Met N/A Common ControlPLEASE ADDRESS ONE OF THE FOLLOWING THREE AREAS (WHERE APPLICABLE) AND PROVIDE EXPLANATIONS ACCORDINGLY

Security Control Implementation Details:In combination with most security guidelines and regulations, RIS/Mediate keeps records for a minimum of one year.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

58

Resourceful Internet Solutions, Inc. System Security Plan

Page 63: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

2.1.172.1.17 System and Communications Protection (SC)System and Communications Protection (SC)

SC-1 System and Communications Policy and ProceduresSecurity Control Requirement:

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SC-2 Application PartitioningSecurity Control Requirement:

The information system separates user functionality (including user interface services) from information system management functionality.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate compartmentalizes company, case and user data based on recommendations by NIST, SEC and other regulatory agencies.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

59

Resourceful Internet Solutions, Inc. System Security Plan

Page 64: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-4 Information RemnanceSecurity Control Requirement:

The information system prevents unauthorized and unintended information transfer via shared system resources.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate compartmentalizes company, case and user data based on recommendations by NIST, SEC and other regulatory agencies.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

SC-5 Denial of Service ProtectionSecurity Control Requirement:

The information system protects against or limits the effects of the following types of denial of service attacks.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs industrial standard firewall technology to protect against many unwanted events including denial of services attacks, port scanning and unauthorized access.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

60

Resourceful Internet Solutions, Inc. System Security Plan

Page 65: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-7 Boundary ProtectionSecurity Control Requirement:

The information system monitors and controls communications at the external boundary of the information system and at key internal boundaries within the system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs industrial standard firewall technology to protect against many unwanted events including denial of services attacks, port scanning and unauthorized access. Amazon Cloud services manages boundary protection within guidelies set forth in ISO 27001, Information Security Management System (ISMS) covering infrastructure, data centers, and services including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3) and Amazon Virtual Private Cloud (Amazon VPC).

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

SC-8 Transmission IntegritySecurity Control Requirement:

The information system protects the integrity of transmitted information.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate runs applications on PCI-compliant technology infrastructure for storing, processing, and transmitting information in the cloud.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

61

Resourceful Internet Solutions, Inc. System Security Plan

Page 66: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-9 Transmission ConfidentialitySecurity Control Requirement:

The information system protects the confidentiality of transmitted information.Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate runs applications on PCI-compliant technology infrastructure for storing, processing, and transmitting information in the cloud.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

SC-10 Network DisconnectSecurity Control Requirement:

The information system terminates a network connection at the end of a session or after 20 minutes of inactivity.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SC-12 Cryptographic Key Establishment and ManagementSecurity Control Requirement:

When cryptography is required and employed within the information system, the organization establishes and manages cryptographic keys using automated mechanisms with supporting procedures or manual procedures.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

62

Resourceful Internet Solutions, Inc. System Security Plan

Page 67: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-13 Use of CryptographySecurity Control Requirement:

For information requiring cryptographic protection, the information system implements cryptographic mechanisms that comply with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

SC-14 Public Access ProtectionsSecurity Control Requirement:

The information system protects the integrity and availability of publicly available information and applications.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate has implemented procedures that allows users to access the system based on strict login credentials and rules utilization. No public access is permmited to the Caseload Manager system.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

63

Resourceful Internet Solutions, Inc. System Security Plan

Page 68: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-15 Collaborative ComputingSecurity Control Requirement:

The information system prohibits remote activation of collaborative computing mechanisms and provides an explicit indication of use to the local users.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate currently does not support concurrent collaborative computing on this platform or system.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

SC-17 Public Key Infrastructure CertificatesSecurity Control Requirement:

The organization issues public key certificates under an appropriate certificate policy or obtains public key certificates under an appropriate certificate policy from an approved service provider.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

64

Resourceful Internet Solutions, Inc. System Security Plan

Page 69: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-18 Mobile CodeSecurity Control Requirement:

The organization: (i) establishes usage restrictions and implementation guidance for mobile code technologies based on the potential to cause damage to the information system if used maliciously; and (ii) authorizes, monitors, and controls the use of mobile code within the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Pending – review in Q4 2013

Planned Security Control:

RIS/Mediate is currently reviewing standards, procedures and feasibility to implement Mobile (mobi) access to the system in future versions.

Compensating Security Control:Non Applicable

SC-19 Voice Over Internet Protocol (VoIP)Security Control Requirement:

The organization: (i) establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and (ii) authorizes, monitors, and controls the use of VoIP within the information system.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

65

Resourceful Internet Solutions, Inc. System Security Plan

Page 70: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-20 Secure Name/Address Resolution Service (Authoritative Source)Security Control Requirement:

The information system that provides name/address resolution service provides additional data origin and integrity artifacts along with the authoritative data it returns in response to resolution queries.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:Currently, NIST Special Publication 800-53 (SP 800-53r3) does not require the zone to have a signed delegation from its parent, nor have signed child delegations.

Planned Security Control:Scheduled for review in Q4 2013 – Because it is encouraged, but not required at this time. Future revisions of this control may make that a requirement.

Compensating Security Control:Non Applicable

SC-22 Architecture and Provisioning for Name/Address Resolution ServiceSecurity Control Requirement:

The information systems that collectively provide name/address resolution service for an organization are fault tolerant and implement role separation.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate maintains a primary and secondary DNS zones. This control was designed to cover the current set of best common practices with regards to DNS server operation. This includes such things as maintaining secondaries for each zone, strict separation of authoritative and recursive caching roles (different servers for each role), restricting recursion for internal hosts via Access Control Lists (or similar methods), etc. NIST SP800-81 contains sections on best common practices for DNS server operation.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

66

Resourceful Internet Solutions, Inc. System Security Plan

Page 71: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

SC-23 Session AuthenticitySecurity Control Requirement:

The information system provides mechanisms to protect the authenticity of communications sessions.

Security Control Implementation Details: Met Partially Met Not Met N/A Common Control

Security Control Implementation Details:RIS/Mediate employs Secure Socket Layers (SSL) to establish secure point-to-point access control. This control focuses on communications protection at the session, versus packet, level. The intent of this control is to establish grounds for confidence at each end of a communications session in the on-going identity of the other party and in the validity of the information being transmitted.

Planned Security Control:Non Applicable – review in Q2 2014

Compensating Security Control:Non Applicable

67

Resourceful Internet Solutions, Inc. System Security Plan

Page 72: Mediate.com Security Policy · Web viewNon Applicable CP-4 Contingency Plan Testing and Exercises Security Control Requirement: The organization: (i) tests and/or exercises the contingency

Resourceful Internet Solutions, Inc. System Security PlanApril 25, 2013

Appendix A

Minor and External Applications InventoryThis appendix includes the minor applications inventory for RIS/Mediate

Adobe Acrobat ReaderMicrosoft Word ReaderMicrosoft Excel ReaderMicrosoft Notepad

68

Resourceful Internet Solutions, Inc. System Security Plan