Under active development Content is continuously updated and improved

CP-8 (03)Telecommunications Services | Separation of Primary and Alternate Providers

High

>Control Description

Obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.

>FedRAMP Baseline Requirements

No FedRAMP-specific parameter values or requirements for this baseline.

>Discussion

Threats that affect telecommunications services are defined in organizational assessments of risk and include natural disasters, structural failures, cyber or physical attacks, and errors of omission or commission. Organizations can reduce common susceptibilities by minimizing shared infrastructure among telecommunications service providers and achieving sufficient geographic separation between services. Organizations may consider using a single service provider in situations where the service provider can provide alternate telecommunications services that meet the separation needs addressed in the risk assessment.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CP-8(3) (Separation Of Primary And Alternate Providers)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CP-8(3)?
  • How frequently is the CP-8(3) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures CP-8(3) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CP-8(3) requirements.
  • What automated tools, systems, or technologies are deployed to implement CP-8(3)?
  • How is CP-8(3) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CP-8(3) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CP-8(3)?
  • What audit logs, records, reports, or monitoring data validate CP-8(3) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CP-8(3) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CP-8(3) compliance?

Ask AI

Configure your API key to use AI features.