Part 10, Chapter 4: Manual Exhibit 10-4-A
Indian Health Service
Cybersecurity and Privacy Control Definitions
Security Assessment and Authorization Controls
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, Revision 4, “Security and Privacy Controls for Federal Information Systems and Organizations,” provides a catalog of security and privacy controls and control enhancements that must be implemented for federal information systems.
Many of these controls and enhancements include specific parameters which must be defined by federal agencies. The Department of Health and Human Services (HHS) has defined roughly 50 percent of these parameters in the HHS-Office of the Chief Information Officer Policy for Information Systems Security and Privacy (IS2P). HHS directs Operating Divisions to inherit these parameters and develop their own definitions for the remaining 50 percent.
The Indian Health Service (IHS) Cybersecurity and Privacy Control Definitions (CPCD) specifies the IHS-defined security control parameters in compliance with HHS direction. The Federal Risk and Authorization Management Program parameters specifically applicable to cloud systems are located at https://www.fedramp.gov/documents/ .
The NIST 800-53, Rev 4 Security Assessment and Authorization (CA) family controls that were withdrawn or were not selected by HHS are not included in the table below. The NIST 800-53, Rev 4 controls are located at https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/final [m]$.showExitDisclaimer()[/m.
Control ID |
Control Title |
Control Description |
IHS Minimum Requirement by System Category |
||
Low |
Moderate |
High |
|||
Security Assessment and Authorization (CA) |
|||||
CA-1 |
Security Assessment and Authorization Policies and Procedures |
IHS:
|
Selected |
Selected |
Selected |
CA-2 |
Security Assessments |
IHS:
|
Selected |
Selected |
Selected |
CA-2 c.e.1 |
Independent Assessors |
IHS employs independent assessors or assessment teams with IHS-defined parameters of independence. Note: The AO determines (i) the required level of assessor independence based on the security categorization of the information system and/or the ultimate risk to organizational operations and assets, and to individuals; and (ii) if the level of assessor independence is sufficient to provide confidence that the assessment results produced are sound and can be used to make a credible, risk-based decision. |
Not Selected |
Selected |
Selected |
CA-2 c.e.2 |
Specialized Assessments |
IHS includes, as part of security control assessments, penetration testing at least once every two years, in compliance with CA-8. |
Not selected |
Not selected |
Selected |
CA-2 c.e.3 |
External Organizations |
IHS accepts the results of an assessment of IHS information systems performed by a certified independent assessor when the assessment meets all Federal Information Security Modernization Act, Office of Management and Budget, Federal Information Processing Standards (FIPS), NIST, HHS, and IHS standards. |
Not selected |
Not selected |
Selected |
CA-3 |
System Inter-connections |
IHS:
Note: This control does not apply to cloud computing systems. |
Selected |
Selected |
Selected |
IHS also considers the following actions:
|
|||||
CA-3 c.e.5 |
Restrictions on External System Connections |
IHS employs a deny-all, permit-by-exception (i.e., whitelisting) policy for allowing IHS information systems to connect to external information systems. |
Not selected |
Selected |
Selected |
CA-5 |
Plan of Action and Milestones |
IHS:
|
Selected |
Selected |
Selected |
CA-6 |
Security Authorization |
IHS:
|
Selected |
Selected |
Selected |
CA-7 |
Continuous Monitoring |
IHS develops a continuous monitoring strategy and implements a continuous monitoring program that includes:
|
Selected |
Selected |
Selected |
CA-7 c.e.1 |
Independent Assessment |
The Cybersecurity Incident Response Team performs scans on all networked devices on an ongoing basis. Areas will also employ independent assessors, assessment teams, and continuous monitoring data reviewers to monitor the IHS-defined security control parameters for IHS information systems. Note: The AO determines (i) the required level of assessor independence based on the security categorization of the information system and/or the ultimate risk to IHS operations and assets, and to individuals; and (ii) if the level of assessor independence is sufficient to provide confidence that the assessment results produced are sound and can be used to make a credible, risk-based decision. |
Not Selected |
Selected |
Selected |
CA-8 |
Penetration Testing |
IHS conducts penetration testing at least every two years on FIPS 199 high-impact, high-profile (e.g., public-facing or highly visible), or high-risk systems, as identified by the IHS AO. |
Not Selected |
Not Selected |
Selected |
CA-9 |
Internal System Connections |
IHS:
Note: This control applies to connections between IHS information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. The IHS can authorize each individual internal connection, or internal connections for a class of components (e.g., all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability; or all smart phones with a specific baseline configuration). |
Selected |
Selected |
Selected |