
The Arizona Risk and Authorization Management Program (AZRAMP) is a security framework used by the State of Arizona to vet and authorize cloud service products. It is modeled after the Federal Risk and Authorization Management Program (FedRAMP) to ensure third-party vendors meet strict NIST-based data protection standards.
The organization limits information system access to authorized users.
a. Develop; document; and disseminate to defined personnel or roles an access control policy that addresses purpose; scope; roles; responsibilities; and compliance; and procedures to facilitate implementation; b. Designate an official to manage the policy; c. Review and update the policy and procedures defined frequency.
a. Define and document the types of accounts allowed and prohibited; b. Assign account managers; c. Require prerequisites for group/role membership; d. Specify authorized users; e. Require approvals for account creation; f. Create; enable; modify; disable; and remove accounts; g. Monitor account use.
Support the management of system accounts using organization-defined automated mechanisms.
Automatically remove or disable temporary and emergency accounts after organization-defined time period.
Disable accounts within defined time period when the accounts have expired; are no longer associated with a user; are in violation of policy; or have been inactive.
Automatically audit account creation; modification; enabling; disabling; and removal actions.
Require that users log out when organization-defined time period of expected inactivity or description of when to log out.
Disable accounts of individuals within defined time period of discovery of significant risks.
Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Enforce approved authorizations for controlling the flow of information within the system and between connected systems.
Identify and document duties of individuals requiring separation; and define system access authorizations to support separation of duties.
Employ the principle of least privilege; allowing only authorized accesses for users (or processes) that are necessary to accomplish assigned organizational tasks.
Authorize access for defined individuals or roles to security functions (hardware; software; firmware) and security-relevant information.
Require that users of system accounts with access to security functions use non-privileged accounts or roles when accessing nonsecurity functions.
Restrict privileged accounts on the system to organization-defined personnel or roles.
Review the privileges assigned to defined roles or classes of users at defined frequency to validate the need for such privileges.
Log the execution of privileged functions.
Prevent non-privileged users from executing privileged functions.
Enforce a limit of consecutive invalid logon attempts by a user during a defined time period; and automatically lock the account/node.
Purge or wipe information from mobile devices after organization-defined number of consecutive; unsuccessful device logon attempts.
Display system use notification message or banner before granting access that states the system is monitored; unauthorized use is prohibited; and use indicates consent.
Limit the number of concurrent sessions for each account and/or account type to defined number.
Prevent further access to the system by initiating a device lock after defined time period of inactivity or requiring user to initiate lock.
Conceal; via the device lock; information previously visible on the display with a publicly viewable image.
Automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
Identify user actions that can be performed on the system without identification or authentication; and document supporting rationale.
Establish and document usage restrictions; configuration/connection requirements; and implementation guidance for remote access; and authorize each type of remote access.
Employ automated mechanisms to monitor and control remote access methods.
Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
Route remote accesses through authorized and managed network access control points.
Authorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence.
Provide the capability to disconnect or disable remote access to the system within organization-defined time period.
Establish configuration requirements; connection requirements; and implementation guidance for wireless access; and authorize each type of wireless access.
Protect wireless access to the system using authentication of users/devices and encryption.
Disable; when not intended for use; wireless networking capabilities embedded within system components prior to issuance and deployment.
Establish configuration requirements; connection requirements; and implementation guidance for organization-controlled mobile devices.
Employ full-device encryption or container-based encryption to protect the confidentiality and integrity of information on mobile devices.
Establish terms and conditions or identify controls consistent with trust relationships for accessing the system from external systems.
Permit authorized individuals to use an external system to access the system only after verification of controls or retention of approved agreements.
Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems.
Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions.
Designate individuals authorized to make information publicly accessible; train them; and review content prior to posting.
The organization ensures that managers and users of information systems are made aware of the security risks.
Develop; document; and disseminate an awareness and training policy and procedures.
Provide security and privacy literacy training to system users as part of initial training and defined frequency thereafter.
Provide literacy training on recognizing and reporting potential indicators of insider threat.
Provide literacy training on recognizing and reporting potential and actual instances of social engineering and social mining.
Provide role-based security and privacy training to personnel with assigned security roles and responsibilities.
Provide personnel with initial and periodic training in the employment and operation of personally identifiable information processing and transparency controls.
Document and monitor information security and privacy training activities; and retain individual training records.
The organization creates; protects; and retains information system audit records.
Develop; document; and disseminate an audit and accountability policy and procedures.
Identify the types of events that the system is capable of logging and specify event types for logging within the system.
Ensure that audit records contain information that establishes what type of event occurred; when; where; source; outcome; and identity.
Generate audit records containing organization-defined additional information.
Limit personally identifiable information contained in audit records to elements identified in the privacy risk assessment.
Allocate audit log storage capacity to accommodate organization-defined audit log retention requirements.
Alert defined personnel in the event of an audit logging process failure and take additional actions.
Provide a warning to defined personnel within defined time period when allocated audit log storage volume reaches defined percentage.
Review and analyze system audit records at defined frequency for indications of inappropriate or unusual activity.
Integrate audit record review; analysis; and reporting processes using automated mechanisms.
Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.
Provide an audit record reduction and report generation capability that supports on-demand review and does not alter original content.
Provide and implement the capability to process; sort; and search audit records for events of interest.
Use internal system clocks to generate time stamps for audit records that meet defined granularity and use Coordinated Universal Time (UTC).
Protect audit information and audit logging tools from unauthorized access; modification; and deletion.
Authorize access to management of audit logging functionality to only a subset of privileged users.
Retain audit records for defined time period to provide support for after-the-fact investigations and meet regulatory requirements.
Provide audit record generation capability for the event types the system is capable of auditing.
Employ methods for coordinating audit information among external organizations when audit information is transmitted across boundaries.
The organization assesses the security controls in the information system.
Develop; document; and disseminate an assessment; authorization; and monitoring policy and procedures.
Select appropriate assessor; develop assessment plan; assess controls; and produce assessment report.
Employ independent assessors or assessment teams to conduct control assessments.
Include specialized assessments (e.g. penetration testing; vulnerability scanning) as part of control assessments.
Approve and manage the exchange of information between the system and other systems using agreements.
Develop a plan of action and milestones (POA&M) to document planned remediation actions for weaknesses.
Assign a senior official as the authorizing official; ensure they accept risk and authorize the system to operate.
Develop a system-level continuous monitoring strategy and implement continuous monitoring.
Employ independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.
Conduct penetration testing at defined frequency on defined systems.
Employ an independent penetration testing agent or team to perform penetration testing.
Authorize internal connections of system components to the system and document interface characteristics.
The organization establishes and maintains the integrity of information system products and systems.
Develop; document; and disseminate a configuration management policy and procedures.
Develop; document; and maintain a current baseline configuration of the system.
Maintain the currency; completeness; accuracy; and availability of the baseline configuration using automated mechanisms.
Retain defined number of previous versions of baseline configurations to support rollback.
Issue systems with specific configurations to individuals traveling to high-risk locations.
Determine types of changes; review and approve changes; document decisions; and implement approved changes.
Test; validate; and document changes to the system before finalizing the implementation.
Require security and privacy representatives to be members of the configuration change control element.
Analyze changes to the system to determine potential security and privacy impacts prior to implementation.
Verify that impacted controls are implemented correctly and operating as intended after system changes.
Define; document; approve; and enforce physical and logical access restrictions associated with changes.
Establish and document configuration settings that reflect the most restrictive mode consistent with operational requirements.
Configure the system to provide only mission essential capabilities and prohibit unauthorized functions/ports.
Review the system periodically to identify and disable unnecessary functions; ports; protocols; and services.
Prevent program execution in accordance with policies regarding software usage.
Identify authorized software and employ a deny-all; permit-by-exception policy.
Develop and document an inventory of system components that accurately reflects the system.
Update the inventory of system components as part of component installations; removals; and system updates.
Detect the presence of unauthorized components using automated mechanisms and take action.
Develop; document; and implement a configuration management plan.
Use software in accordance with contract agreements and copyright laws; and track use.
Establish restrictions on the use of open-source software.
Establish policies governing installation of software by users and enforce them.
Identify and document the location of information and system components.
Use automated tools to identify information by type on system components.
The organization establishes; maintains; and effectively implements plans for emergency response; backup operations; and post-disaster recovery.
Develop; document; and disseminate a contingency planning policy and procedures.
Develop a contingency plan that identifies essential functions; recovery objectives; and roles.
Coordinate contingency plan development with organizational elements responsible for related plans.
Plan for the resumption of mission and business functions within defined time period.
Identify critical system assets supporting mission and business functions.
Provide contingency training to system users consistent with assigned roles.
Test the contingency plan to determine effectiveness and readiness.
Coordinate contingency plan testing with organizational elements responsible for related plans.
Establish an alternate storage site including necessary agreements.
Identify an alternate storage site that is sufficiently separated from the primary site.
Identify potential accessibility problems to the alternate storage site.
Establish an alternate processing site.
Identify an alternate processing site that is sufficiently separated from the primary site.
Identify potential accessibility problems to alternate processing sites.
Develop alternate processing site agreements that contain priority-of-service provisions.
Establish alternate telecommunications services.
Develop telecommunications service agreements that contain priority-of-service provisions.
Obtain alternate telecommunications services to reduce likelihood of sharing a single point of failure.
Conduct backups of user-level and system-level information.
Test backup information to verify media reliability and information integrity.
Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of backup information.
Provide for the recovery and reconstitution of the system to a known state.
Implement transaction recovery for systems that are transaction-based.
The organization identifies information system users; processes acting on behalf of users; or devices and authenticates (or verifies) the identities of those users; processes; or devices.
Develop; document; and disseminate an identification and authentication policy and procedures.
Uniquely identify and authenticate organizational users.
Implement multi-factor authentication for access to privileged accounts.
Implement multi-factor authentication for access to non-privileged accounts.
Implement multi-factor authentication where one factor is provided by a separate device.
Implement replay-resistant authentication mechanisms.
Uniquely identify and authenticate devices before establishing a connection.
Manage system identifiers by receiving authorization; selecting identifiers; assigning them; and preventing reuse.
Manage individual identifiers by uniquely identifying each individual as having a specific status (e.g. contractor).
Manage system authenticators including verification; initial content; strength; and protection.
Enforce password complexity; lifetime; and protection rules; and block compromised passwords.
Enforce authorized access to private keys and map identity for public key-based authentication.
Protect authenticators commensurate with the security category of the information.
Obscure feedback of authentication information during the authentication process.
Implement mechanisms for authentication to a cryptographic module.
Uniquely identify and authenticate non-organizational users.
Accept only external authenticators that are NIST-compliant.
Conform to profiles for identity management.
Require users to re-authenticate when defined circumstances occur.
Identity proof users that require accounts.
Require evidence of individual identification.
Require that presented identity evidence be validated and verified.
Require that a code be delivered out-of-band to verify the user's address.
The organization establishes an operational incident handling capability.
Develop; document; and disseminate an incident response policy and procedures.
Provide incident response training to system users consistent with roles.
Provide incident response training on how to identify and respond to a breach.
Test the effectiveness of the incident response capability.
Coordinate incident response testing with organizational elements responsible for related plans.
Implement an incident handling capability that includes preparation; detection; analysis; containment; eradication; and recovery.
Support the incident handling process using automated mechanisms.
Track and document incidents.
Require personnel to report suspected incidents and report information to authorities.
Report incidents using automated mechanisms.
Provide incident information to supply chain partners related to the incident.
Provide an incident response support resource.
Increase the availability of incident response information using automated mechanisms.
Develop an incident response plan.
Include process for breaches involving PII in the IR Plan.
Respond to information spills.
The organization performs periodic and timely maintenance on information systems.
Develop; document; and disseminate a maintenance policy and procedures.
Schedule; document; and review records of maintenance; approve and monitor activities.
Approve; control; and monitor the use of system maintenance tools.
Inspect maintenance tools for improper modifications.
Check media containing diagnostic programs for malicious code.
Prevent removal of maintenance equipment containing organizational information.
Approve and monitor nonlocal maintenance; allow only consistent with policy; use strong auth.
Establish process for maintenance personnel authorization and maintain list.
Obtain maintenance support within defined time period of failure.
The organization protects information system media.
Develop; document; and disseminate a media protection policy and procedures.
Restrict access to media to authorized personnel.
Mark system media indicating distribution limitations.
Physically control and securely store media.
Protect and control media during transport outside controlled areas.
Sanitize media prior to disposal or reuse.
Review; approve; track; document; and verify media sanitization actions.
Restrict or prohibit use of specific media types.
The organization protects information systems from physical and environmental threats.
Develop; document; and disseminate a physical and environmental protection policy.
Maintain list of authorized individuals and issue credentials.
Enforce physical access authorizations at entry/exit points.
Control physical access to transmission lines.
Control physical access to output devices.
Monitor physical access to the facility.
Monitor physical access using alarms and surveillance.
Maintain visitor access records.
Protect power equipment and cabling.
Provide capability of shutting off power in emergency.
Provide UPS to facilitate orderly shutdown.
Employ automatic emergency lighting.
Employ fire detection and suppression systems.
Employ fire detection systems that activate automatically and notify.
Employ fire suppression systems that activate automatically.
Ensure facility undergoes fire protection inspections.
Maintain temperature and humidity levels.
Employ environmental monitoring with alarms.
Protect from water damage with shutoff valves.
Authorize and control system components entering/exiting facility.
Determine alternate work sites and employ controls.
Position components to minimize potential damage and unauthorized access.
The organization develops; documents; periodically updates; and implements security plans for organizational information systems.
Develop; document; and disseminate a planning policy and procedures.
Develop security and privacy plans for the system.
Establish rules of behavior for individuals accessing the system.
Include restrictions on social media use in rules of behavior.
Develop security and privacy architectures for the system.
Centrally manage organization-defined controls.
Select a control baseline for the system.
Tailor the selected control baseline.
The organization manages its information security program.
Develop and disseminate an organization-wide information security program plan.
Appoint a senior agency information security officer.
Implement a process for POA&Ms.
Develop and update an inventory of organizational systems.
Address security in critical infrastructure protection plan.
Develop a comprehensive risk management strategy.
Manage security state through authorization processes.
Implement process for testing; training; and monitoring.
Develop and disseminate a privacy program plan.
Appoint a senior agency official for privacy.
Develop and maintain accounting of PII disclosures.
Develop policies for PII accuracy.
Develop policies to minimize PII use in testing.
Develop privacy reports.
Develop organization-wide continuous monitoring strategy.
The organization ensures that individuals occupying positions of responsibility are trustworthy and meet established security criteria.
Develop; document; and disseminate a personnel security policy and procedures.
Assign risk designation to all positions.
Screen individuals prior to authorizing access.
Disable access and retrieve property upon termination.
Review access when individuals transfer positions.
Develop and document access agreements.
Establish personnel security requirements for external providers.
Employ formal sanctions process.
Incorporate security roles into position descriptions.
The organization protects personally identifiable information (PII).
Develop; document; and disseminate PII policy and procedures.
Determine and document authority to process PII.
Identify and document purposes for processing PII.
Provide notice to individuals about PII processing.
Apply processing conditions for specific categories of PII.
Eliminate unnecessary collection of SSNs.
The organization assesses risk to organizational operations.
Develop; document; and disseminate a risk assessment policy and procedures.
Categorize the system and information.
Conduct a risk assessment.
Assess supply chain risks.
Monitor and scan for vulnerabilities.
Update system vulnerabilities to be scanned.
Define breadth and depth of scanning.
Implement privileged access for scanning.
Review historic logs for past exploitation.
Respond to findings from assessments.
Conduct PIAs.
The organization allocates resources and manages the system development life cycle.
Develop; document; and disseminate a system and services acquisition policy.
Determine and allocate resources for security.
Manage system using SDLC that incorporates security.
Include security requirements in acquisition contracts.
Require developer to describe functional properties of controls.
Require developer to provide design info.
Require developer to identify functions; ports; protocols; services.
Employ FIPS 201-approved PIV products.
Obtain or develop administrator and user documentation.
Apply engineering principles in design.
Require providers to comply with security requirements.
Require providers to identify functions; ports; protocols.
Restrict location of processing/storage.
Require developer to perform CM.
Require developer to perform testing.
Require developer to perform threat modeling.
Require developer to follow documented process.
The organization monitors; controls; and protects organizational communications.
Develop; document; and disseminate a SC policy and procedures.
Separate user functionality from system management.
Prevent unauthorized information transfer via shared resources.
Protect against denial-of-service events.
Monitor and control communications at boundaries.
Limit external connections.
Implement managed interface for external services.
Deny traffic by default; allow by exception.
Prevent split tunneling.
Route traffic through authenticated proxy.
Apply processing rules to PII at boundaries.
Protect confidentiality/integrity of transmitted info.
Implement crypto to prevent disclosure/modification.
Terminate connection at end of session or inactivity.
Establish and manage cryptographic keys.
Implement cryptography.
Prohibit remote activation of collaborative devices.
Issue certificates from approved PKI.
Define and control mobile code.
Provide additional artifacts for name resolution.
Perform data origin authentication on responses.
Ensure fault-tolerant name resolution.
Protect authenticity of sessions.
Protect information at rest.
Implement crypto for data at rest.
Maintain separate execution domains.
Synchronize clocks.
The organization identifies; reports; and corrects information and system flaws.
Develop; document; and disseminate SI policy and procedures.
Identify; report; and correct system flaws.
Determine update status using automation.
Implement malicious code protection.
Monitor system to detect attacks.
Employ automated tools for analysis.
Monitor traffic for unusual activity.
Alert personnel on compromise indicators.
Implement host-based monitoring.
Receive and respond to alerts.
Employ integrity verification tools.
Perform integrity checks.
Notify on integrity violations.
Incorporate detection into IR.
Employ spam protection.
Automatically update spam protection.
Check validity of inputs.
Generate error messages without revealing info.
Manage and retain information.
Minimize PII in testing.
Dispose of information securely.
Protect system memory.
Remove PII from datasets.
The organization manages supply chain risks.
Develop; document; and disseminate SCRM policy.
Develop a SCRM plan.
Establish a SCRM team.
Establish process to address supply chain weaknesses.
Employ acquisition strategies to mitigate risk.
Assess and review supplier risks.
Establish agreements for notification of compromises.
Inspect systems for tampering.
Develop anti-counterfeit policy.
Train personnel to detect counterfeits.
Maintain configuration control during service.
Dispose of components securely.