Under active development Content is continuously updated and improved

CP-2(8)Contingency Plan | Identify Critical Assets

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Identify critical system assets supporting all; essential mission and business functions.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Organizations may choose to identify critical assets as part of criticality analysis, business continuity planning, or business impact analyses. Organizations identify critical system assets so that additional controls can be employed (beyond the controls routinely implemented) to help ensure that organizational mission and business functions can continue to be conducted during contingency operations. The identification of critical information assets also facilitates the prioritization of organizational resources.

Critical system assets include technical and operational aspects. Technical aspects include system components, information technology services, information technology products, and mechanisms. Operational aspects include procedures (i.e., manually executed operations) and personnel (i.e., individuals operating technical controls and/or executing manual procedures).

Organizational program protection plans can assist in identifying critical assets. If critical assets are resident within or supported by external service providers, organizations consider implementing CP-2(7) as a control enhancement.

>Programmatic Queries

Beta

Related Services

AWS Config
AWS Tag Editor
AWS Resource Groups

CLI Commands

List all resources tagged as critical
aws resourcegroupstaggingapi get-resources --tag-filters Key=criticality,Values=mission-essential
Create resource group for critical assets
aws resource-groups create-group --name cp-2-8-critical-assets --resource-query '{"Type":"TAG_FILTERS_1_0","Query":"tag:criticality=mission-essential"}'
List AWS Config rules for critical assets
aws configservice describe-config-rules --query 'ConfigRules[*].[ConfigRuleName,Description]'
Get inventory of critical EC2 instances
aws ec2 describe-instances --filters Name=tag:criticality,Values=mission-essential --query 'Reservations[*].Instances[*].[InstanceId,InstanceType,Tags]'

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-2(8) (Identify Critical Assets)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-2(8)?
  • How frequently is the CP-2(8) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-2(8) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-2(8) requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-2(8)?
  • How is CP-2(8) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-2(8) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-2(8)?
  • What audit logs, records, reports, or monitoring data validate CP-2(8) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-2(8) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-2(8) compliance?

Ask AI

Configure your API key to use AI features.