Under active development Content is continuously updated and improved

CP-2(1)Contingency Plan | Coordinate with Related Plans

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Coordinate contingency plan development with organizational elements responsible for related plans.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Plans that are related to contingency plans include Business Continuity Plans, Disaster Recovery Plans, Critical Infrastructure Plans, Continuity of Operations Plans, Crisis Communications Plans, Insider Threat Implementation Plans, Data Breach Response Plans, Cyber Incident Response Plans, Breach Response Plans, and Occupant Emergency Plans.

>Programmatic Queries

Beta

Related Services

AWS Backup
AWS Systems Manager
AWS CloudFormation

CLI Commands

List all backup plans
aws backup list-backup-plans
Create a backup plan for disaster recovery coordination
aws backup create-backup-plan --backup-plan '{"BackupPlanName":"cp-2-1-plan","Rules":[{"RuleName":"daily","TargetBackupVault":"default"}]}'
Retrieve Systems Manager document for contingency coordination
aws ssm get-document --name AWS-RunShellScript --document-format TEXT
List CloudFormation stacks for plan tracking
aws cloudformation list-stacks --stack-status-filter CREATE_COMPLETE UPDATE_COMPLETE

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-2(1) (Coordinate With Related Plans)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-2(1)?
  • How frequently is the CP-2(1) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-2(1) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-2(1) requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-2(1)?
  • How is CP-2(1) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-2(1) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-2(1)?
  • What audit logs, records, reports, or monitoring data validate CP-2(1) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-2(1) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-2(1) compliance?

Ask AI

Configure your API key to use AI features.