AC-21—Information Sharing
>Control Description
Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information's access and use restrictions for ⚙organization-defined information sharing circumstances where user discretion is required; and
Employ ⚙organization-defined automated mechanisms or manual processes to assist users in making information sharing and collaboration decisions.
>FedRAMP Baseline Requirements
No FedRAMP-specific parameter values or requirements for this baseline.
>Discussion
Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive information, classified information related to special access programs or compartments, privileged information, proprietary information, and personally identifiable information. Security and privacy risk assessments as well as applicable laws, regulations, and policies can provide useful inputs to these determinations.
Depending on the circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program or compartment. Access restrictions may include non-disclosure agreements (NDA).
Information flow techniques and security attributes may be used to provide automated assistance to users making sharing and collaboration decisions.
>Cross-Framework Mappings
>Programmatic Queries
Related Services
CLI Commands
aws ram get-resource-shares --resource-owner SELFaws ram list-principals --resource-owner SELFaws s3control list-access-points --account-id ACCOUNT_IDaws lakeformation list-permissions>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AC-21 (Information Sharing)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AC-21?
- •How frequently is the AC-21 policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AC-21?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AC-21 requirements.
- •What automated tools, systems, or technologies are deployed to implement AC-21?
- •How is AC-21 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AC-21 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AC-21?
- •What audit logs, records, reports, or monitoring data validate AC-21 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AC-21 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AC-21 compliance?
Ask AI
Configure your API key to use AI features.