Under active development Content is continuously updated and improved

CA-7Continuous Monitoring

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes: a. Establishing the following system-level metrics to be monitored: organization-defined system-level metrics; b. Establishing organization-defined frequencies for monitoring and organization-defined frequencies for assessment of control effectiveness; c. Ongoing control assessments in accordance with the continuous monitoring strategy; d. Ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; e. Correlation and analysis of information generated by control assessments and monitoring; f. Response actions to address results of the analysis of control assessment and monitoring information; and g. Reporting the security and privacy status of the system to organization-defined personnel or roles organization-defined frequency.

>DoD Impact Level Requirements

FedRAMP Parameter Values

CA-7 (g)-1 [to include JAB/AO]

Additional Requirements and Guidance

CA-7 Requirement: Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually. CA-7 Requirement: CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (ConMon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSOs authorized via the Agency path as each agency customer is responsible for performing ConMon oversight. It does not apply to CSOs authorized via the JAB path because the JAB performs ConMon oversight. CA-7 Guidance: FedRAMP does not provide a template for the Continuous Monitoring Plan. CSPs should reference the FedRAMP Continuous Monitoring Strategy Guide when developing the Continuous Monitoring Plan.

>Discussion

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess and monitor their controls and risks at a frequency sufficient to support risk-based decisions. Different types of controls may require different monitoring frequencies.

The results of continuous monitoring generate risk response actions by organizations. When monitoring the effectiveness of multiple controls that have been grouped into capabilities, a root-cause analysis may be needed to determine the specific control that has failed. Continuous monitoring programs allow organizations to maintain the authorizations of systems and common controls in highly dynamic environments of operation with changing mission and business needs, threats, vulnerabilities, and technologies.

Having access to security and privacy information on a continuing basis through reports and dashboards gives organizational officials the ability to make effective and timely risk management decisions, including ongoing authorization decisions. Automation supports more frequent updates to hardware, software, and firmware inventories, authorization packages, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely.

Continuous monitoring activities are scaled in accordance with the security categories of systems. Monitoring requirements, including the need for specific monitoring, may be referenced in other controls and control enhancements, such as AC-2g, AC-2(7), AC-2(12)(a), AC-2(7)(b), AC-2(7)(c), AC-17(1), AT-4a, AU-13, AU-13(1), AU-13(2), CM-3f, CM-6d, CM-11c, IR-5, MA-2b, MA-3a, MA-4a, PE-3d, PE-6, PE-14b, PE-16, PE-20, PM-6, PM-23, PM-31, PS-7e, SA-9c, SR-4, SC-5(3)(b), SC-7a, SC-7(24)(b), SC-18b, SC-43b, and SI-4.

>Programmatic Queries

Beta

Related Services

Security Hub
Config
CloudWatch

CLI Commands

Check Security Hub status
aws securityhub describe-hub
List enabled security standards
aws securityhub get-enabled-standards
Get Config recorder status
aws configservice describe-configuration-recorder-status
List CloudWatch alarms for security
aws cloudwatch describe-alarms --alarm-name-prefix Security

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CA-7 (Continuous Monitoring)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CA-7?
  • How frequently is the CA-7 policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CA-7?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CA-7 requirements.
  • What automated tools, systems, or technologies are deployed to implement CA-7?
  • How is CA-7 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CA-7 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CA-7?
  • What audit logs, records, reports, or monitoring data validate CA-7 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CA-7 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CA-7 compliance?

Ask AI

Configure your API key to use AI features.