Separation from Primary Site CP-7(1)
Overview:
The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.
Supplemental Guidance:
Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.
Related control:RA-3.
Action Items:
1) Establish a an alternate processing site for operations and ensure it is secured and sufficiently separated from the primary site
Related Documents:
1) Contingency Plan Policy
2) Business Continuity Plans
3) Disaster Recovery Plan
Additional Guidance:
Moderate FedRAMP-Defined Assignment / Selection Parameters
none
Moderate Additional FedRAMP Requirements and Guidance
CP-7 (1) Guidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.