Skip to content

Commit

Permalink
Merge pull request #76 from Chiakao/patch-6
Browse files Browse the repository at this point in the history
Update AU-Policy.md
  • Loading branch information
dandersonsw authored May 31, 2024
2 parents 76ad413 + 7f1cccf commit 0398fbd
Showing 1 changed file with 5 additions and 4 deletions.
9 changes: 5 additions & 4 deletions AU-Policy.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Audit and accountability management policy

See [CIO 2100.1L – GSA IT Security
Policy](https://www.gsa.gov/cdnstatic/CIO_2100_1L_CHGE_1_CC040905_signed_PDF_version_7-15-2019.pdf)
See [CIO 2100.1P – GSA IT Security
Policy](https://www.gsa.gov/directives/files?file=2024-02%2FCC048589%20Final%20Directive%20CIO%202100.1P%20GSA%20Information%20Technology%20Security%20Policy.pdf)

* Chapter 3, _Policy for Identify Function_, which covers:
* AU-1 policy control
Expand All @@ -12,7 +12,7 @@ Policy](https://www.gsa.gov/cdnstatic/CIO_2100_1L_CHGE_1_CC040905_signed_PDF_ver
* Chapter 6, _Policy for Respond Function_, which covers:
* AU-6, AU-7s

The latest version can be found on the [GSA IT Security Policies](https://www.gsa.gov/about-us/organization/office-of-the-chief-information-officer/chief-information-security-officer-ciso/it-security-policies) page.
The latest version can be found on the [GSA IT Security Policies](https://www.gsa.gov/policy-regulations/policy/information-technology-policy/gsa-it-security-policies) page.

## Purpose

Expand Down Expand Up @@ -101,7 +101,7 @@ We use reporting rulesets developed by the Snort, Nessus and ClamAV teams, which
Security vulnerabilities and system inconsistencies are reviewed by the Cloud Operations team (notified by email, text message and voice phone call). Security vulnerabilities which are not classified as high are reviewed weekly and resolved by Cloud Operations. Regular security reports are automatically generated by Nessus and sent to the System Owner, GSA’s Information Security team and other partner agencies as required.
See SI procedures for more detail.

The Cloud Operations team acts on findings that result from its regular audit process according to its incident response guidelines (https://docs.cloud.gov/ops/security-ir), including notifying GSA Information Security, the System Owner, and the ISSO.
The Cloud Operations team acts on findings that result from its regular audit process according to its incident response guidelines (https://github.com/cloud-gov/internal-docs/blob/main/docs/resources/Plans-and-Procedures/security-ir.md), including notifying GSA Information Security, the System Owner, and the ISSO.

See AU-6.

Expand Down Expand Up @@ -203,3 +203,4 @@ Complete version history: https://github.com/cloud-gov/cg-compliance-docs/commit
* 2020-11: Update links to GitHub and GSA policies, split controls by CSF, add version history
* 2021-11: Update to reference Grafana and Prometheus instead of obsoleted components
* 2023-07: Update AU-11 guidance for M-21-31 and AWS WAF exception
* 2024-05: Update links to GSA Security Policy and Incident Response Guideline

0 comments on commit 0398fbd

Please sign in to comment.