Separation from Primary Site CP-7(1)


Overview:
The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.


Supplemental Guidance:
Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.


Related control:RA-3.


Action Items:
1) Establish a an alternate processing site for operations and ensure it is secured and sufficiently separated from the primary site

 

Related Documents:
1) Contingency Plan Policy

2) Business Continuity Plans

3) Disaster Recovery Plan


Additional Guidance:
Moderate FedRAMP-Defined Assignment / Selection Parameters
none


Moderate Additional FedRAMP Requirements and Guidance
CP-7 (1) Guidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.



Article ID: 679
Created: September 29, 2022
Last Updated: September 29, 2022
Author: Matthew Burdick

Online URL: http://www.compliancewiki.org/article/separation-from-primary-site-cp-7-1-679.html