Under active development Content is continuously updated and improved
Home / Frameworks / GovRAMP

GovRAMP vRev 5

Government Risk and Authorization Management Program - Security Baselines for State and Local Government Cloud Services

Baseline levels, control titles, and core control designations sourced from the official GovRAMP published documents. Cross-framework mappings derived from the Secure Controls Framework (SCF), licensed under CC BY-ND 4.0.

AC Access Control (54 controls)

AC-01Policy and Procedures
AC-02Account Management
AC-02(01)Account Management | Automated System Account Management
AC-02(02)Account Management | Automated Temporary and Emergency Account Management
AC-02(03)Account Management | Disable Accounts
AC-02(04)Account Management | Automated Audit Actions
AC-02(05)Account Management | Inactivity Logout
AC-02(07)Account Management | Privileged User Accounts
AC-02(09)Account Management | Restrictions on Use of Shared and Group Accounts
AC-02(10)AC-02(10)
AC-02(11)AC-02(11)
AC-02(12)Account Management | Account Monitoring for Atypical Usage
AC-02(13)Account Management | Disable Accounts for High-risk Individuals
AC-03Access Enforcement
AC-04Information Flow Enforcement
AC-04(08)AC-04(08)
AC-04(21)Information Flow Enforcement | Physical or Logical Separation of Information Flows
AC-05Separation of Duties
AC-06Least Privilege
AC-06(01)Least Privilege | Authorize Access to Security Functions
AC-06(02)Least Privilege | Non-privileged Access for Nonsecurity Functions
AC-06(03)AC-06(03)
AC-06(05)Least Privilege | Privileged Accounts
AC-06(07)Least Privilege | Review of User Privileges
AC-06(08)AC-06(08)
AC-06(09)Least Privilege | Log Use of Privileged Functions
AC-06(10)Least Privilege | Prohibit Non-privileged Users from Executing Privileged Functions
AC-07Unsuccessful Logon Attempts
AC-07(02)AC-07(02)
AC-08System Use Notification
AC-10AC-10
AC-11Device Lock
AC-11(01)Device Lock | Pattern-hiding Displays
AC-12Session Termination
AC-12(01)AC-12(01)
AC-14Permitted Actions Without Identification or Authentication
AC-17Remote Access
AC-17(01)Remote Access | Monitoring and Control
AC-17(02)Remote Access | Protection of Confidentiality and Integrity Using Encryption
AC-17(03)Remote Access | Managed Access Control Points
AC-17(04)Remote Access | Privileged Commands and Access
AC-17(09)AC-17(09)
AC-18Wireless Access
AC-18(01)Wireless Access | Authentication and Encryption
AC-18(03)Wireless Access | Disable Wireless Networking
AC-18(04)AC-18(04)
AC-18(05)AC-18(05)
AC-19Access Control for Mobile Devices
AC-19(05)Access Control for Mobile Devices | Full Device or Container-based Encryption
AC-20Use of External Systems
AC-20(01)Use of External Systems | Limits on Authorized Use
AC-20(02)Use of External Systems | Portable Storage Devices — Restricted Use
AC-21Information Sharing
AC-22Publicly Accessible Content

CM Configuration Management (36 controls)

CM-01Policy and Procedures
CM-02Baseline Configuration
CM-02(01)CM-02(01)
CM-02(02)Baseline Configuration | Automation Support for Accuracy and Currency
CM-02(03)Baseline Configuration | Retention of Previous Configurations
CM-02(07)Baseline Configuration | Configure Systems and Components for High-risk Areas
CM-03Configuration Change Control
CM-03(01)CM-03(01)
CM-03(02)Configuration Change Control | Testing, Validation, and Documentation of Changes
CM-03(04)Configuration Change Control | Security and Privacy Representatives
CM-03(06)CM-03(06)
CM-04Impact Analyses
CM-04(01)CM-04(01)
CM-05Access Restrictions for Change
CM-05(01)Access Restrictions for Change | Automated Access Enforcement and Audit Records
CM-05(02)CM-05(02)
CM-05(03)CM-05(03)
CM-05(05)Access Restrictions for Change | Privilege Limitation for Production and Operation
CM-06Configuration Settings
CM-06(01)Configuration Settings | Automated Management, Application, and Verification
CM-06(02)CM-06(02)
CM-07Least Functionality
CM-07(01)Least Functionality | Periodic Review
CM-07(02)Least Functionality | Prevent Program Execution
CM-07(05)Least Functionality | Authorized Software — Allow-by-exception
CM-08System Component Inventory
CM-08(01)System Component Inventory | Updates During Installation and Removal
CM-08(02)CM-08(02)
CM-08(03)System Component Inventory | Automated Unauthorized Component Detection
CM-08(04)CM-08(04)
CM-08(05)CM-08(05)
CM-09Configuration Management Plan
CM-10Software Usage Restrictions
CM-10(01)CM-10(01)
CM-11User-installed Software
CM-11(01)CM-11(01)

IA Identification and Authentication (31 controls)

IA-01Policy and Procedures
IA-02Identification and Authentication (organizational Users)
IA-02(01)Identification and Authentication (organizational Users) | Multi-factor Authentication to Privileged Accounts
IA-02(02)Identification and Authentication (organizational Users) | Multi-factor Authentication to Non-privileged Accounts
IA-02(03)IA-02(03)
IA-02(04)IA-02(04)
IA-02(05)Identification and Authentication (organizational Users) | Individual Authentication with Group Authentication
IA-02(08)Identification and Authentication (organizational Users) | Access to Accounts — Replay Resistant
IA-02(09)IA-02(09)
IA-02(11)IA-02(11)
IA-02(12)IA-02(12)
IA-03Device Identification and Authentication
IA-04Identifier Management
IA-04(04)Identifier Management | Identify User Status
IA-05Authenticator Management
IA-05(01)Authenticator Management | Password-based Authentication
IA-05(02)Authenticator Management | Public Key-based Authentication
IA-05(03)IA-05(03)
IA-05(04)IA-05(04)
IA-05(06)Authenticator Management | Protection of Authenticators
IA-05(07)Authenticator Management | No Embedded Unencrypted Static Authenticators
IA-05(08)IA-05(08)
IA-05(11)IA-05(11)
IA-05(13)IA-05(13)
IA-06Authentication Feedback
IA-07Cryptographic Module Authentication
IA-08Identification and Authentication (non-organizational Users)
IA-08(01)IA-08(01)
IA-08(02)Identification and Authentication (non-organizational Users) | Acceptance of External Authenticators
IA-08(03)IA-08(03)
IA-08(04)Identification and Authentication (non-organizational Users) | Use of Defined Profiles

SC System and Communications Protection (39 controls)

SI System and Information Integrity (39 controls)