2022-01-26T16:18:10.197Z 2022-01-26T16:18:10.198Z 2022-01-26T16:18:10.199Z 2022-01-26T16:18:10.200Z 2022-01-26T16:18:10.201Z 2022-01-26T16:18:10.202Z 2022-01-26T16:18:10.203Z 2022-01-26T16:18:10.204Z 2022-01-26T16:18:10.205Z 2022-01-26T16:18:10.206Z 2022-01-26T16:18:10.207Z 2022-01-26T16:18:10.208Z 2022-01-26T16:18:10.209Z 2022-01-26T16:18:10.210Z 2022-01-26T16:18:10.211Z 2022-01-26T16:18:10.212Z 2022-01-26T16:18:10.213Z 2022-01-26T16:18:10.214Z 2022-01-26T16:18:10.215Z 2022-01-26T16:18:10.216Z 2022-01-26T16:18:10.217Z 2022-01-26T16:18:10.218Z 2022-01-26T16:18:10.219Z 2022-01-26T16:18:10.220Z 2022-01-26T16:18:10.221Z 2022-01-26T16:18:10.222Z 2022-01-26T16:18:10.223Z 2022-01-26T16:18:10.224Z 2022-01-26T16:18:10.225Z 2022-01-26T16:18:10.226Z 2022-01-26T16:18:10.227Z 2022-01-26T16:18:10.228Z 2022-01-26T16:18:10.229Z 2022-01-26T16:18:10.230Z 2022-01-26T16:18:10.231Z 2022-01-26T16:18:10.232Z 2022-01-26T16:18:10.233Z 2022-01-26T16:18:10.234Z 2022-01-26T16:18:10.235Z 2022-01-26T16:18:10.236Z 2022-01-26T16:18:10.237Z 2022-01-26T16:18:10.238Z 2022-01-26T16:18:10.239Z 2022-01-26T16:18:10.240Z 2022-01-26T16:18:10.241Z 2022-01-26T16:18:10.242Z 2022-01-26T16:18:10.243Z 2022-01-26T16:18:10.244Z 2022-01-26T16:18:10.245Z 2022-01-26T16:18:10.246Z 2022-01-26T16:18:10.247Z 2022-01-26T16:18:10.248Z 2022-01-26T16:18:10.249Z 2022-01-26T16:18:10.250Z 2022-01-26T16:18:10.251Z 2022-01-26T16:18:10.252Z 2022-01-26T16:18:10.253Z 2022-01-26T16:18:10.254Z 2022-01-26T16:18:10.255Z 2022-01-26T16:18:10.256Z 2022-01-26T16:18:10.257Z 2022-01-26T16:18:10.258Z 2022-01-26T16:18:10.259Z 2022-01-26T16:18:10.260Z 2022-01-26T16:18:10.261Z 2022-01-26T16:18:10.262Z 2022-01-26T16:18:10.263Z 2022-01-26T16:18:10.264Z 2022-01-26T16:18:10.265Z 2022-01-26T16:18:10.266Z 2022-01-26T16:18:10.267Z 2022-01-26T16:18:10.268Z 2022-01-26T16:18:10.269Z 2022-01-26T16:18:10.270Z 2022-01-26T16:18:10.271Z 2022-01-26T16:18:10.272Z 2022-01-26T16:18:10.273Z 2022-01-26T16:18:10.274Z 2022-01-26T16:18:10.275Z 2022-01-26T16:18:10.276Z 2022-01-26T16:18:10.277Z 2022-01-26T16:18:10.278Z 2022-01-26T16:18:10.279Z 2022-01-26T16:18:10.280Z 2022-01-26T16:18:10.281Z 2022-01-26T16:18:10.282Z 2022-01-26T16:18:10.283Z 2022-01-26T16:18:10.284Z 2022-01-26T16:18:10.285Z 2022-01-26T16:18:10.286Z 2022-01-26T16:18:10.287Z 2022-01-26T16:18:10.288Z 2022-01-26T16:18:10.289Z 2022-01-26T16:18:10.290Z 2022-01-26T16:18:10.291Z 2022-01-26T16:18:10.292Z 2022-01-26T16:18:10.293Z 2022-01-26T16:18:10.294Z 2022-01-26T16:18:10.295Z 2022-01-26T16:18:10.296Z 2022-01-26T16:18:10.297Z 2022-01-26T16:18:10.298Z 2022-01-26T16:18:10.299Z 2022-01-26T16:18:10.300Z 2022-01-26T16:18:10.301Z 2022-01-26T16:18:10.302Z 2022-01-26T16:18:10.303Z 2022-01-26T16:18:10.304Z 2022-01-26T16:18:10.305Z 2022-01-26T16:18:10.306Z 2022-01-26T16:18:10.307Z 2022-01-26T16:18:10.308Z 2022-01-26T16:18:10.309Z 2022-01-26T16:18:10.310Z 2022-01-26T16:18:10.311Z 2022-01-26T16:18:10.312Z 2022-01-26T16:18:10.313Z 2022-01-26T16:18:10.314Z 2022-01-26T16:18:10.315Z 2022-01-26T16:18:10.316Z 2022-01-26T16:18:10.317Z 2022-01-26T16:18:10.318Z 2022-01-26T16:18:10.319Z 2022-01-26T16:18:10.320Z 2022-01-26T16:18:10.321Z 2022-01-26T16:18:10.322Z 2022-01-26T16:18:10.323Z 2022-01-26T16:18:10.324Z 2022-01-26T16:18:10.325Z 2022-01-26T16:18:10.326Z 2022-01-26T16:18:10.327Z 2022-01-26T16:18:10.328Z 2022-01-26T16:18:10.329Z 2022-01-26T16:18:10.330Z 2022-01-26T16:18:10.331Z 2022-01-26T16:18:10.332Z 2022-01-26T16:18:10.333Z 2022-01-26T16:18:10.334Z 2022-01-26T16:18:10.335Z 2022-01-26T16:18:10.336Z 2022-01-26T16:18:10.337Z 2022-01-26T16:18:10.338Z 2022-01-26T16:18:10.339Z 2022-01-26T16:18:10.340Z 2022-01-26T16:18:10.341Z 2022-01-26T16:18:10.342Z 2022-01-26T16:18:10.343Z 2022-01-26T16:18:10.344Z 2022-01-26T16:18:10.345Z 2022-01-26T16:18:10.346Z 2022-01-26T16:18:10.347Z 2022-01-26T16:18:10.348Z 2022-01-26T16:18:10.349Z 2022-01-26T16:18:10.350Z 2022-01-26T16:18:10.351Z 2022-01-26T16:18:10.352Z 2022-01-26T16:18:10.353Z 2022-01-26T16:18:10.354Z 2022-01-26T16:18:10.355Z 2022-01-26T16:18:10.356Z 2022-01-26T16:18:10.357Z 2022-01-26T16:18:10.358Z 2022-01-26T16:18:10.359Z 2022-01-26T16:18:10.360Z 2022-01-26T16:18:10.361Z 2022-01-26T16:18:10.362Z 2022-01-26T16:18:10.363Z 2022-01-26T16:18:10.364Z 2022-01-26T16:18:10.365Z 2022-01-26T16:18:10.366Z 2022-01-26T16:18:10.367Z 2022-01-26T16:18:10.368Z 2022-01-26T16:18:10.369Z 2022-01-26T16:18:10.370Z 2022-01-26T16:18:10.371Z 2022-01-26T16:18:10.372Z 2022-01-26T16:18:10.373Z 2022-01-26T16:18:10.374Z 2022-01-26T16:18:10.375Z 2022-01-26T16:18:10.376Z 2022-01-26T16:18:10.377Z 2022-01-26T16:18:10.378Z 2022-01-26T16:18:10.379Z 2022-01-26T16:18:10.380Z 2022-01-26T16:18:10.381Z 2022-01-26T16:18:10.382Z 2022-01-26T16:18:10.383Z 2022-01-26T16:18:10.384Z 2022-01-26T16:18:10.385Z 2022-01-26T16:18:10.386Z 2022-01-26T16:18:10.387Z 2022-01-26T16:18:10.388Z 2022-01-26T16:18:10.389Z 2022-01-26T16:18:10.390Z 2022-01-26T16:18:10.391Z 2022-01-26T16:18:10.392Z 2022-01-26T16:18:10.393Z 2022-01-26T16:18:10.394Z 2022-01-26T16:18:10.395Z 2022-01-26T16:18:10.396Z 2022-01-26T16:18:10.397Z 2022-01-26T16:18:10.398Z 2022-01-26T16:18:10.399Z 2022-01-26T16:18:10.400Z 2022-01-26T16:18:10.401Z 2022-01-26T16:18:10.402Z 2022-01-26T16:18:10.403Z 2022-01-26T16:18:10.404Z 2022-01-26T16:18:10.405Z 2022-01-26T16:18:10.406Z 2022-01-26T16:18:10.407Z 2022-01-26T16:18:10.408Z 2022-01-26T16:18:10.409Z 2022-01-26T16:18:10.410Z 2022-01-26T16:18:10.411Z 2022-01-26T16:18:10.412Z 2022-01-26T16:18:10.413Z 2022-01-26T16:18:10.414Z 2022-01-26T16:18:10.415Z 2022-01-26T16:18:10.416Z 2022-01-26T16:18:10.417Z 2022-01-26T16:18:10.418Z 2022-01-26T16:18:10.419Z 2022-01-26T16:18:10.420Z 2022-01-26T16:18:10.421Z 2022-01-26T16:18:10.422Z 2022-01-26T16:18:10.423Z 2022-01-26T16:18:10.424Z 2022-01-26T16:18:10.425Z 2022-01-26T16:18:10.426Z 2022-01-26T16:18:10.427Z 2022-01-26T16:18:10.428Z 2022-01-26T16:18:10.429Z 2022-01-26T16:18:10.430Z 2022-01-26T16:18:10.431Z 2022-01-26T16:18:10.432Z 2022-01-26T16:18:10.433Z 2022-01-26T16:18:10.434Z 2022-01-26T16:18:10.435Z 2022-01-26T16:18:10.436Z 2022-01-26T16:18:10.437Z 2022-01-26T16:18:10.438Z 2022-01-26T16:18:10.439Z 2022-01-26T16:18:10.440Z 2022-01-26T16:18:10.441Z 2022-01-26T16:18:10.442Z 2022-01-26T16:18:10.443Z 2022-01-26T16:18:10.444Z 2022-01-26T16:18:10.445Z 2022-01-26T16:18:10.446Z 2022-01-26T16:18:10.447Z 2022-01-26T16:18:10.448Z 2022-01-26T16:18:10.449Z 2022-01-26T16:18:10.450Z 2022-01-26T16:18:10.451Z 2022-01-26T16:18:10.452Z 2022-01-26T16:18:10.453Z 2022-01-26T16:18:10.454Z 2022-01-26T16:18:10.455Z 2022-01-26T16:18:10.456Z 2022-01-26T16:18:10.457Z 2022-01-26T16:18:10.458Z 2022-01-26T16:18:10.459Z 2022-01-26T16:18:10.460Z 2022-01-26T16:18:10.461Z 2022-01-26T16:18:10.462Z 2022-01-26T16:18:10.463Z 2022-01-26T16:18:10.464Z 2022-01-26T16:18:10.465Z 2022-01-26T16:18:10.466Z 2022-01-26T16:18:10.467Z 2022-01-26T16:18:10.468Z 2022-01-26T16:18:10.469Z 2022-01-26T16:18:10.470Z 2022-01-26T16:18:10.471Z 2022-01-26T16:18:10.472Z 2022-01-26T16:18:10.473Z 2022-01-26T16:18:10.474Z 2022-01-26T16:18:10.475Z 2022-01-26T16:18:10.476Z 2022-01-26T16:18:10.477Z 2022-01-26T16:18:10.478Z 2022-01-26T16:18:10.479Z 2022-01-26T16:18:10.480Z 2022-01-26T16:18:10.481Z 2022-01-26T16:18:10.482Z 2022-01-26T16:18:10.483Z 2022-01-26T16:18:10.484Z 2022-01-26T16:18:10.485Z 2022-01-26T16:18:10.486Z 2022-01-26T16:18:10.487Z 2022-01-26T16:18:10.488Z 2022-01-26T16:18:10.489Z 2022-01-26T16:18:10.490Z 2022-01-26T16:18:10.491Z 2022-01-26T16:18:10.492Z 2022-01-26T16:18:10.493Z 2022-01-26T16:18:10.494Z 2022-01-26T16:18:10.495Z 2022-01-26T16:18:10.496Z 2022-01-26T16:18:10.497Z 2022-01-26T16:18:10.498Z 2022-01-26T16:18:10.499Z 2022-01-26T16:18:10.500Z 2022-01-26T16:18:10.501Z 2022-01-26T16:18:10.502Z 2022-01-26T16:18:10.503Z 2022-01-26T16:18:10.504Z 2022-01-26T16:18:10.505Z 2022-01-26T16:18:10.506Z 2022-01-26T16:18:10.507Z 2022-01-26T16:18:10.508Z 2022-01-26T16:18:10.509Z 2022-01-26T16:18:10.510Z 2022-01-26T16:18:10.511Z 2022-01-26T16:18:10.512Z 2022-01-26T16:18:10.513Z 2022-01-26T16:18:10.514Z 2022-01-26T16:18:10.515Z 2022-01-26T16:18:10.516Z 2022-01-26T16:18:10.517Z 2022-01-26T16:18:10.518Z 2022-01-26T16:18:10.519Z 2022-01-26T16:18:10.520Z 2022-01-26T16:18:10.521Z 2022-01-26T16:18:10.522Z 2022-01-26T16:18:10.523Z 2022-01-26T16:18:10.524Z 2022-01-26T16:18:10.525Z 2022-01-26T16:18:10.526Z 2022-01-26T16:18:10.527Z 2022-01-26T16:18:10.528Z 2022-01-26T16:18:10.529Z 2022-01-26T16:18:10.530Z 2022-01-26T16:18:10.531Z 2022-01-26T16:18:10.532Z 2022-01-26T16:18:10.533Z 2022-01-26T16:18:10.534Z 2022-01-26T16:18:10.535Z 2022-01-26T16:18:10.536Z 2022-01-26T16:18:10.537Z 2022-01-26T16:18:10.538Z 2022-01-26T16:18:10.539Z 2022-01-26T16:18:10.540Z 2022-01-26T16:18:10.541Z 2022-01-26T16:18:10.542Z 2022-01-26T16:18:10.543Z 2022-01-26T16:18:10.544Z 2022-01-26T16:18:10.545Z 2022-01-26T16:18:10.546Z 2022-01-26T16:18:10.547Z 2022-01-26T16:18:10.548Z 2022-01-26T16:18:10.549Z 2022-01-26T16:18:10.550Z 2022-01-26T16:18:10.551Z 2022-01-26T16:18:10.552Z 2022-01-26T16:18:10.553Z 2022-01-26T16:18:10.554Z 2022-01-26T16:18:10.555Z 2022-01-26T16:18:10.556Z 2022-01-26T16:18:10.557Z 2022-01-26T16:18:10.558Z 2022-01-26T16:18:10.559Z 2022-01-26T16:18:10.560Z 2022-01-26T16:18:10.561Z 2022-01-26T16:18:10.562Z 2022-01-26T16:18:10.563Z 2022-01-26T16:18:10.564Z 2022-01-26T16:18:10.565Z 2022-01-26T16:18:10.566Z 2022-01-26T16:18:10.567Z 2022-01-26T16:18:10.568Z 2022-01-26T16:18:10.569Z 2022-01-26T16:18:10.570Z 2022-01-26T16:18:10.571Z 2022-01-26T16:18:10.572Z 2022-01-26T16:18:10.573Z 2022-01-26T16:18:10.574Z 2022-01-26T16:18:10.575Z 2022-01-26T16:18:10.576Z 2022-01-26T16:18:10.577Z 2022-01-26T16:18:10.578Z 2022-01-26T16:18:10.579Z 2022-01-26T16:18:10.580Z 2022-01-26T16:18:10.581Z 2022-01-26T16:18:10.582Z 2022-01-26T16:18:10.583Z 2022-01-26T16:18:10.584Z 2022-01-26T16:18:10.585Z 2022-01-26T16:18:10.586Z 2022-01-26T16:18:10.587Z 2022-01-26T16:18:10.588Z 2022-01-26T16:18:10.589Z 2022-01-26T16:18:10.590Z 2022-01-26T16:18:10.591Z 2022-01-26T16:18:10.592Z 2022-01-26T16:18:10.593Z 2022-01-26T16:18:10.594Z 2022-01-26T16:18:10.595Z 2022-01-26T16:18:10.596Z 2022-01-26T16:18:10.597Z 2022-01-26T16:18:10.598Z 2022-01-26T16:18:10.599Z 2022-01-26T16:18:10.600Z 2022-01-26T16:18:10.601Z 2022-01-26T16:18:10.602Z 2022-01-26T16:18:10.603Z 2022-01-26T16:18:10.604Z 2022-01-26T16:18:10.605Z 2022-01-26T16:18:10.606Z 2022-01-26T16:18:10.607Z 2022-01-26T16:18:10.608Z 2022-01-26T16:18:10.609Z 2022-01-26T16:18:10.610Z 2022-01-26T16:18:10.611Z 2022-01-26T16:18:10.612Z 2022-01-26T16:18:10.613Z 2022-01-26T16:18:10.614Z 2022-01-26T16:18:10.615Z 2022-01-26T16:18:10.616Z 2022-01-26T16:18:10.617Z 2022-01-26T16:18:10.618Z 2022-01-26T16:18:10.619Z 2022-01-26T16:18:10.620Z 2022-01-26T16:18:10.621Z 2022-01-26T16:18:10.622Z 2022-01-26T16:18:10.623Z 2022-01-26T16:18:10.624Z 2022-01-26T16:18:10.625Z 2022-01-26T16:18:10.626Z 2022-01-26T16:18:10.627Z 2022-01-26T16:18:10.628Z 2022-01-26T16:18:10.629Z 2022-01-26T16:18:10.630Z 2022-01-26T16:18:10.631Z 2022-01-26T16:18:10.632Z 2022-01-26T16:18:10.633Z 2022-01-26T16:18:10.634Z 2022-01-26T16:18:10.635Z 2022-01-26T16:18:10.636Z 2022-01-26T16:18:10.637Z 2022-01-26T16:18:10.638Z 2022-01-26T16:18:10.639Z 2022-01-26T16:18:10.640Z 2022-01-26T16:18:10.641Z 2022-01-26T16:18:10.642Z 2022-01-26T16:18:10.643Z 2022-01-26T16:18:10.644Z 2022-01-26T16:18:10.645Z 2022-01-26T16:18:10.646Z 2022-01-26T16:18:10.647Z 2022-01-26T16:18:10.648Z 2022-01-26T16:18:10.649Z 2022-01-26T16:18:10.650Z 2022-01-26T16:18:10.651Z 2022-01-26T16:18:10.652Z 2022-01-26T16:18:10.653Z 2022-01-26T16:18:10.654Z 2022-01-26T16:18:10.655Z 2022-01-26T16:18:10.656Z 2022-01-26T16:18:10.657Z 2022-01-26T16:18:10.658Z 2022-01-26T16:18:10.659Z 2022-01-26T16:18:10.660Z 2022-01-26T16:18:10.661Z 2022-01-26T16:18:10.662Z 2022-01-26T16:18:10.663Z 2022-01-26T16:18:10.664Z 2022-01-26T16:18:10.665Z 2022-01-26T16:18:10.666Z 2022-01-26T16:18:10.667Z 2022-01-26T16:18:10.668Z 2022-01-26T16:18:10.669Z 2022-01-26T16:18:10.670Z 2022-01-26T16:18:10.671Z 2022-01-26T16:18:10.672Z 2022-01-26T16:18:10.673Z 2022-01-26T16:18:10.674Z 2022-01-26T16:18:10.675Z 2022-01-26T16:18:10.676Z 2022-01-26T16:18:10.677Z 2022-01-26T16:18:10.678Z 2022-01-26T16:18:10.679Z 2022-01-26T16:18:10.680Z 2022-01-26T16:18:10.681Z 2022-01-26T16:18:10.682Z 2022-01-26T16:18:10.683Z 2022-01-26T16:18:10.684Z 2022-01-26T16:18:10.685Z 2022-01-26T16:18:10.686Z 2022-01-26T16:18:10.687Z 2022-01-26T16:18:10.688Z 2022-01-26T16:18:10.689Z 2022-01-26T16:18:10.690Z 2022-01-26T16:18:10.691Z 2022-01-26T16:18:10.692Z 2022-01-26T16:18:10.693Z 2022-01-26T16:18:10.694Z created2022-01-26T16:18:10.197ZdescriptionThe organization: *AC-2a.Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types]; *AC-2b.Assigns account managers for information system accounts; *AC-2c.Establishes conditions for group and role membership; *AC-2d.Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account; *AC-2e.Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts; *AC-2f.Creates, enables, modifies, disables, and removes information system accounts in accordance with [Assignment: organization-defined procedures or conditions]; *AC-2g.Monitors the use of information system accounts; *AC-2h.Notifies account managers: *AC-2h.1.When accounts are no longer required; *AC-2h.2.When users are terminated or transferred; and *AC-2h.3.When individual information system usage or need-to-know changes; *AC-2i.Authorizes access to the information system based on: *AC-2i.1.A valid access authorization; *AC-2i.2.Intended system usage; and *AC-2i.3.Other attributes as required by the organization or associated missions/business functions; *AC-2j.Reviews accounts for compliance with account management requirements [Assignment: organization-defined frequency]; and *AC-2k.Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group. Information system account types include, for example, individual, shared, group, system, guest/anonymous, emergency, developer/manufacturer/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.external_references idcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426amodified2022-01-26T16:18:10.197ZnameAccount Managementtypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-2source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.198ZdescriptionThe organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].external_references idcourse-of-action--da3887bb-036c-44ce-b005-31e4cba9b6b7modified2022-01-26T16:18:10.198ZnameInactivity Logouttypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-2 (5)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.199ZdescriptionThe information system enforces [Assignment: organization-defined circumstances and/or usage conditions] for [Assignment: organization-defined information system accounts]. Organizations can describe the specific conditions or circumstances under which information system accounts can be used, for example, by restricting usage to certain days of the week, time of day, or specific durations of time.external_references idcourse-of-action--089e0a59-cfd4-481f-9a12-20cc2cc3f02amodified2022-01-26T16:18:10.199ZnameUsage Conditionstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-2 (11)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.200Zdescription[Withdrawn: Incorporated into AC-6].external_references idcourse-of-action--40564ef3-1f5f-4e26-a9d8-43fea3312bb9modified2022-01-26T16:18:10.200ZnameRestricted Access To Privileged Functionstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-3 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.201Zdescription[Withdrawn: Incorporated into MP-4 and SC-28].external_references idcourse-of-action--5ccb6a90-1241-4ac2-ba46-b9b7337d8239modified2022-01-26T16:18:10.201ZnameProtection Of User And System Informationtypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP1 external_idAC-3 (6)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.202ZdescriptionThe information system uses [Assignment: organization-defined security attributes] associated with [Assignment: organization-defined information, source, and destination objects] to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions. Information flow enforcement mechanisms compare security attributes associated with information (data content and data structure) and source/destination objects, and respond appropriately (e.g., block, quarantine, alert administrator) when the mechanisms encounter information flows not explicitly allowed by information flow policies. For example, an information object labeled Secret would be allowed to flow to a destination object labeled Secret, but an information object labeled Top Secret would not be allowed to flow to a destination object labeled Secret. Security attributes can also include, for example, source and destination addresses employed in traffic filter firewalls. Flow enforcement using explicit security attributes can be used, for example, to control the release of certain types of information.external_references idcourse-of-action--4fa30d4c-3335-4d0e-93ed-6788e67011a6modified2022-01-26T16:18:10.202ZnameObject Security Attributestypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-4 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.203ZdescriptionThe information system enforces information flow control based on [Assignment: organization-defined metadata]. Metadata is information used to describe the characteristics of data. Metadata can include structural metadata describing data structures (e.g., data format, syntax, and semantics) or descriptive metadata describing data contents (e.g., age, location, telephone number). Enforcing allowed information flows based on metadata enables simpler and more effective flow control. Organizations consider the trustworthiness of metadata with regard to data accuracy (i.e., knowledge that the metadata values are correct with respect to the data), data integrity (i.e., protecting against unauthorized changes to metadata tags), and the binding of metadata to the data payload (i.e., ensuring sufficiently strong binding techniques with appropriate levels of assurance).external_references idcourse-of-action--96e6235f-a439-4793-b2d7-a4a70f882055modified2022-01-26T16:18:10.203ZnameMetadatatypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP1 external_idAC-4 (6)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.204ZdescriptionThe information system, when transferring information between different security domains, uses [Assignment: organization-defined data type identifiers] to validate data essential for information flow decisions. Data type identifiers include, for example, filenames, file types, file signatures/tokens, and multiple internal file signatures/tokens. Information systems may allow transfer of data only if compliant with data type format specifications.external_references idcourse-of-action--fec1b34a-1529-404d-8a92-cf7855eed1edmodified2022-01-26T16:18:10.204ZnameData Type Identifierstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP1 external_idAC-4 (12)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.205ZdescriptionThe information system, when transferring information between different security domains, implements [Assignment: organization-defined security policy filters] requiring fully enumerated formats that restrict data structure and content. Data structure and content restrictions reduce the range of potential malicious and/or unsanctioned content in cross-domain transactions. Security policy filters that restrict data structures include, for example, restricting file sizes and field lengths. Data content policy filters include, for example: (i) encoding formats for character sets (e.g., Universal Character Set Transformation Formats, American Standard Code for Information Interchange); (ii) restricting character data fields to only contain alpha-numeric characters; (iii) prohibiting special characters; and (iv) validating schema structures.external_references idcourse-of-action--44e0986b-6c7a-469e-bac7-133e8c1e70c5modified2022-01-26T16:18:10.205ZnameSecurity Policy Filter Constraintstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP1 external_idAC-4 (14)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.206ZdescriptionThe organization employs [Assignment: organization-defined solutions in approved configurations] to control the flow of [Assignment: organization-defined information] across security domains. Organizations define approved solutions and configurations in cross-domain policies and guidance in accordance with the types of information flows across classification boundaries. The Unified Cross Domain Management Office (UCDMO) provides a baseline listing of approved cross-domain solutions.external_references idcourse-of-action--a8f0c663-717a-43dc-b585-7f18afa6ceecmodified2022-01-26T16:18:10.206ZnameApproved Solutionstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP1 external_idAC-4 (20)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.207ZdescriptionThe organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information]. Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users.external_references idcourse-of-action--be65cb08-f40e-45e9-a39b-9c16dedf36d0modified2022-01-26T16:18:10.207ZnameAuthorize Access To Security Functionstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-6 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.208ZdescriptionThe organization prohibits privileged access to the information system by non-organizational users.external_references idcourse-of-action--ea531ea9-1c10-465f-b97b-ed145feedce5modified2022-01-26T16:18:10.208ZnamePrivileged Access By Non-Organizational Userstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-6 (6)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.209ZdescriptionThe information system: *AC-7a.Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and *AC-7b.Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded. This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.external_references idcourse-of-action--7cc1e029-afae-4493-996d-4ece4189dfddmodified2022-01-26T16:18:10.209ZnameUnsuccessful Logon Attemptstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP2 external_idAC-7source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.210ZdescriptionThe information system notifies the user of the number of [Selection: successful logons/accesses; unsuccessful logon/access attempts; both] during [Assignment: organization-defined time period].external_references idcourse-of-action--21333ef2-61b6-4e36-b5f2-a4c91419e068modified2022-01-26T16:18:10.210ZnameSuccessful / Unsuccessful Logonstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP0 external_idAC-9 (2)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.211ZdescriptionThe information system automatically terminates a user session after [Assignment: organization-defined conditions or trigger events requiring session disconnect]. This control addresses the termination of user-initiated logical sessions in contrast to SC-10 which addresses the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination terminates all processes associated with a user�s logical session except those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, time-of-day restrictions on information system use.external_references idcourse-of-action--4ce8375d-79cc-4639-963e-2b9834587761modified2022-01-26T16:18:10.211ZnameSession Terminationtypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP2 external_idAC-12source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.212Zdescription[Withdrawn: Incorporated into MP-3].external_references idcourse-of-action--45a540ad-888a-4a33-8f85-fea063791a2emodified2022-01-26T16:18:10.212ZnameAutomated Markingtypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP3 external_idAC-15source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.213ZdescriptionThe information system supports the association of [Assignment: organization-defined security attributes] with [Assignment: organization-defined subjects and objects] by authorized individuals (or processes acting on behalf of individuals). The support provided by information systems can vary to include: (i) prompting users to select specific security attributes to be associated with specific information objects; (ii) employing automated mechanisms for categorizing information with appropriate attributes based on defined policies; or (iii) ensuring that the combination of selected security attributes selected is valid. Organizations consider the creation, deletion, or modification of security attributes when defining auditable events.external_references idcourse-of-action--13ae8e23-4aad-454d-b528-f31ace2845e6modified2022-01-26T16:18:10.213ZnameAssociation Of Attributes By Authorized Individualstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP0 external_idAC-16 (4)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.214ZdescriptionThe information system provides authorized individuals the capability to define or change the type and value of security attributes available for association with subjects and objects. The content or assigned values of security attributes can directly affect the ability of individuals to access organizational information. Therefore, it is important for information systems to be able to limit the ability to create or modify security attributes to authorized individuals only.external_references idcourse-of-action--615f6afb-779c-4c69-80ef-73cc5b3b52f6modified2022-01-26T16:18:10.214ZnameAttribute Configuration By Authorized Individualstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_priorityP0 external_idAC-16 (10)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.215Zdescription[Withdrawn: Incorporated into SI-4].external_references idcourse-of-action--ec710c63-a621-42c7-924b-c974ca2d1c54modified2022-01-26T16:18:10.215ZnameMonitoring For Unauthorized Connectionstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-17 (5)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.216ZdescriptionThe organization: *AC-18a.Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and *AC-18b.Authorizes wireless access to the information system prior to allowing such connections. Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.external_references idcourse-of-action--8c70c121-fa3c-414f-ab07-3f353a01b119modified2022-01-26T16:18:10.216ZnameWireless Accesstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-18source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.217ZdescriptionThe organization: *AC-19a.Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and *AC-19b.Authorizes the connection of mobile devices to organizational information systems. A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.external_references idcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640modified2022-01-26T16:18:10.217ZnameAccess Control For Mobile Devicestypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-19source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.218ZdescriptionThe organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to: *AC-20a.Access the information system from external information systems; and *AC-20b.Process, store, or transmit organization-controlled information using external information systems. External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.external_references idcourse-of-action--8d52ad8e-74c0-4b42-877b-412581a6db7amodified2022-01-26T16:18:10.218ZnameUse Of External Information Systemstypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP1 external_idAC-20source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.219ZdescriptionThe organization: *AC-21a.Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and *AC-21b.Employs [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions. This control applies to information that may be restricted in some manner (e.g., privileged medical information, contract-sensitive information, proprietary information, personally identifiable information, classified information related to special access programs or compartments) based on some formal or administrative determination. Depending on the particular information-sharing circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program/compartment.external_references idcourse-of-action--32c6ca50-0659-4880-bf51-7ec778c3adebmodified2022-01-26T16:18:10.219ZnameInformation Sharingtypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP2 external_idAC-21source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.220ZdescriptionThe information system transmits [Assignment: organization-defined access authorization information] using [Assignment: organization-defined security safeguards] to [Assignment: organization-defined information systems] that enforce access control decisions. In distributed information systems, authorization processes and access control decisions may occur in separate parts of the systems. In such instances, authorization information is transmitted securely so timely access control decisions can be enforced at the appropriate locations. To support the access control decisions, it may be necessary to transmit as part of the access authorization information, supporting security attributes. This is due to the fact that in distributed information systems, there are various access control decisions that need to be made and different entities (e.g., services) make these decisions in a serial fashion, each requiring some security attributes to make the decisions. Protecting access authorization information (i.e., access control decisions) ensures that such information cannot be altered, spoofed, or otherwise compromised during transmission.external_references idcourse-of-action--e1a686a0-2e07-4b30-a09e-8f5e8741f37cmodified2022-01-26T16:18:10.220ZnameTransmit Access Authorization Informationtypecourse-of-actionx_mitre_familyAccess Controlx_mitre_impact x_mitre_priorityP0 external_idAC-24 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.221ZdescriptionThe organization provides basic security awareness training to information system users (including managers, senior executives, and contractors): *AT-2a.As part of initial training for new users; *AT-2b.When required by information system changes; and *AT-2c.[Assignment: organization-defined frequency] thereafter. Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.external_references idcourse-of-action--77c86369-c6df-4e14-b5eb-0cd56df4ea70modified2022-01-26T16:18:10.221ZnameSecurity Awareness Trainingtypecourse-of-actionx_mitre_familyAwareness And Trainingx_mitre_impact x_mitre_priorityP1 external_idAT-2source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.222ZdescriptionThe organization includes practical exercises in security training that reinforce training objectives. Practical exercises may include, for example, security training for software developers that includes simulated cyber attacks exploiting common software vulnerabilities (e.g., buffer overflows), or spear/whale phishing attacks targeted at senior leaders/executives. These types of practical exercises help developers better understand the effects of such vulnerabilities and appreciate the need for security coding standards and processes.external_references idcourse-of-action--6971615f-55ec-4bc9-b766-5be5da2c83c9modified2022-01-26T16:18:10.222ZnamePractical Exercisestypecourse-of-actionx_mitre_familyAwareness And Trainingx_mitre_impact x_mitre_priorityP1 external_idAT-3 (3)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.223ZdescriptionThe organization: *AU-2a.Determines that the information system is capable of auditing the following events: [Assignment: organization-defined auditable events]; *AU-2b.Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events; *AU-2c.Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and *AU-2d.Determines that the following events are to be audited within the information system: [Assignment: organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event]. An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.external_references idcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304modified2022-01-26T16:18:10.223ZnameAudit Eventstypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-2source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.224ZdescriptionThe information system generates audit records containing the following additional information: [Assignment: organization-defined additional, more detailed information]. Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. This facilitates the use of audit trails and audit logs by not including information that could potentially be misleading or could make it more difficult to locate information of interest.external_references idcourse-of-action--441d3fa6-7908-4c4e-9ef8-9141700dc22fmodified2022-01-26T16:18:10.224ZnameAdditional Audit Informationtypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-3 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.225ZdescriptionThe information system provides a warning to [Assignment: organization-defined personnel, roles, and/or locations] within [Assignment: organization-defined time period] when allocated audit record storage volume reaches [Assignment: organization-defined percentage] of repository maximum audit record storage capacity. Organizations may have multiple audit data storage repositories distributed across multiple information system components, with each repository having different storage volume capacities.external_references idcourse-of-action--74e86e23-fd16-446d-860d-44fb55d7b035modified2022-01-26T16:18:10.225ZnameAudit Storage Capacitytypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-5 (1)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.226Zdescription[Withdrawn: Incorporated into SI-4].external_references idcourse-of-action--5dfa6624-8a2a-4260-8143-d6a410ab094emodified2022-01-26T16:18:10.226ZnameAutomated Security Alertstypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-6 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.227ZdescriptionThe organization specifies the permitted actions for each [Selection (one or more): information system process; role; user] associated with the review, analysis, and reporting of audit information. Organizations specify permitted actions for information system processes, roles, and/or users associated with the review, analysis, and reporting of audit records through account management techniques. Specifying permitted actions on audit information is a way to enforce the principle of least privilege. Permitted actions are enforced by the information system and include, for example, read, write, execute, append, and delete.external_references idcourse-of-action--1202a97c-aadb-47f1-92bf-ce535533b1ebmodified2022-01-26T16:18:10.227ZnamePermitted Actionstypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-6 (7)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.228ZdescriptionThe information system provides the capability to sort and search audit records for events of interest based on the content of [Assignment: organization-defined audit fields within audit records]. Sorting and searching of audit records may be based upon the contents of audit record fields, for example: (i) date/time of events; (ii) user identifiers; (iii) Internet Protocol (IP) addresses involved in the event; (iv) type of event; or (v) event success/failure.external_references idcourse-of-action--7e7f13f3-06a7-41c3-9ca4-962444bca917modified2022-01-26T16:18:10.228ZnameAutomatic Sort And Searchtypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP2 external_idAU-7 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.229ZdescriptionThe information system writes audit trails to hardware-enforced, write-once media. This control enhancement applies to the initial generation of audit trails (i.e., the collection of audit records that represents the audit information to be used for detection, analysis, and reporting purposes) and to the backup of those audit trails. The enhancement does not apply to the initial generation of audit records prior to being written to an audit trail. Write-once, read-many (WORM) media includes, for example, Compact Disk-Recordable (CD-R) and Digital Video Disk-Recordable (DVD-R). In contrast, the use of switchable write-protection media such as on tape cartridges or Universal Serial Bus (USB) drives results in write-protected, but not write-once, media.external_references idcourse-of-action--66add454-0867-4551-8144-cff0168ec257modified2022-01-26T16:18:10.229ZnameHardware Write-Once Mediatypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-9 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.230ZdescriptionThe information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed [Assignment: organization-defined actions to be covered by non-repudiation]. Types of individual actions covered by non-repudiation include, for example, creating information, sending and receiving messages, approving information (e.g., indicating concurrence or signing a contract). Non-repudiation protects individuals against later claims by: (i) authors of not having authored particular documents; (ii) senders of not having transmitted messages; (iii) receivers of not having received messages; or (iv) signatories of not having signed documents. Non-repudiation services can be used to determine if information originated from a particular individual, or if an individual took specific actions (e.g., sending an email, signing a contract, approving a procurement request) or received specific information. Organizations obtain non-repudiation services by employing various techniques or mechanisms (e.g., digital signatures, digital message receipts).external_references idcourse-of-action--a2af383f-7caa-443e-8a66-95ab26ff4fc0modified2022-01-26T16:18:10.230ZnameNon-Repudiationtypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP2 external_idAU-10source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.231ZdescriptionThe information system: *AU-10 (4)(a)Validates the binding of the information reviewer identity to the information at the transfer or release points prior to release/transfer between [Assignment: organization-defined security domains]; and *AU-10 (4)(b)Performs [Assignment: organization-defined actions] in the event of a validation error. This control enhancement prevents the modification of information between review and transfer/release. The validation of bindings can be achieved, for example, by the use of cryptographic checksums. Organizations determine validations are in response to user requests or generated automatically.external_references idcourse-of-action--804b9733-243b-4613-b4b3-274a2cebd9c9modified2022-01-26T16:18:10.231ZnameValidate Binding Of Information Reviewer Identitytypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_priorityP2 external_idAU-10 (4)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.232ZdescriptionThe information system produces a system-wide (logical or physical) audit trail composed of audit records in a standardized format. Audit information that is normalized to common standards promotes interoperability and exchange of such information between dissimilar devices and information systems. This facilitates production of event information that can be more readily analyzed and correlated. Standard formats for audit records include, for example, system log records and audit records compliant with Common Event Expressions (CEE). If logging mechanisms within information systems do not conform to standardized formats, systems may convert individual audit records into standardized formats when compiling system-wide audit trails.external_references idcourse-of-action--cf019bcb-0ccf-428f-94e2-905a98f3158emodified2022-01-26T16:18:10.232ZnameStandardized Formatstypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP1 external_idAU-12 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.233ZdescriptionThe information system provides the capability for authorized users to select a user session to capture/record or view/hear. Session audits include, for example, monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session auditing activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, or standards.external_references idcourse-of-action--ee3ad579-c221-4452-b3e0-02218cec7bfemodified2022-01-26T16:18:10.233ZnameSession Audittypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_impact x_mitre_priorityP0 external_idAU-14source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.234ZdescriptionThe organization employs [Assignment: organization-defined methods] for coordinating [Assignment: organization-defined audit information] among external organizations when audit information is transmitted across organizational boundaries. When organizations use information systems and/or services of external organizations, the auditing capability necessitates a coordinated approach across organizations. For example, maintaining the identity of individuals that requested particular services across organizational boundaries may often be very difficult, and doing so may prove to have significant performance ramifications. Therefore, it is often the case that cross-organizational auditing (e.g., the type of auditing capability provided by service-oriented architectures) simply captures the identity of individuals issuing requests at the initial information system, and subsequent systems record that the requests emanated from authorized individuals.external_references idcourse-of-action--02bac81a-b871-4fbf-a788-cbd02976310fmodified2022-01-26T16:18:10.234ZnameCross-Organizational Auditingtypecourse-of-actionx_mitre_familyAudit And Accountabilityx_mitre_priorityP0 external_idAU-16source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.235ZdescriptionThe organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments. Independent assessors or assessment teams are individuals or groups who conduct impartial assessments of organizational information systems. Impartiality implies that assessors are free from any perceived or actual conflicts of interest with regard to the development, operation, or management of the organizational information systems under assessment or to the determination of security control effectiveness. To achieve impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in positions of advocacy for the organizations acquiring their services. Independent assessments can be obtained from elements within organizations or can be contracted to public or private sector entities outside of organizations. Authorizing officials determine the required level of independence based on the security categories of information systems and/or the ultimate risk to organizational operations, organizational assets, or individuals. Authorizing officials also determine if the level of assessor independence provides sufficient assurance that the results are sound and can be used to make credible, risk-based decisions. This includes determining whether contracted security assessment services have sufficient independence, for example, when information system owners are not directly involved in contracting processes or cannot unduly influence the impartiality of assessors conducting assessments. In special situations, for example, when organizations that own the information systems are small or organizational structures require that assessments are conducted by individuals that are in the developmental, operational, or management chain of system owners, independence in assessment processes can be achieved by ensuring that assessment results are carefully reviewed and analyzed by independent teams of experts to validate the completeness, accuracy, integrity, and reliability of the results. Organizations recognize that assessments performed for purposes other than direct support to authorization decisions are, when performed by assessors with sufficient independence, more likely to be useable for such decisions, thereby reducing the need to repeat assessments.external_references idcourse-of-action--df1c28a3-467c-4b7b-8bac-ce5018ac4ec4modified2022-01-26T16:18:10.235ZnameIndependent Assessorstypecourse-of-actionx_mitre_familySecurity Assessment And Authorizationx_mitre_impact x_mitre_priorityP2 external_idCA-2 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.236ZdescriptionThe organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [Assignment; organization-defined boundary protection device]. Organizations typically do not have control over external networks (e.g., the Internet). Approved boundary protection devices (e.g., routers, firewalls) mediate communications (i.e., information flows) between unclassified non-national security systems and external networks. This control enhancement is required for organizations processing, storing, or transmitting Controlled Unclassified Information (CUI).external_references idcourse-of-action--7ff4d7a6-be7a-49dd-a6f0-b1a571953bfdmodified2022-01-26T16:18:10.236ZnameUnclassified Non-National Security System Connectionstypecourse-of-actionx_mitre_familySecurity Assessment And Authorizationx_mitre_impact x_mitre_priorityP1 external_idCA-3 (3)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.237ZdescriptionThe organization employs automated mechanisms to help ensure that the plan of action and milestones for the information system is accurate, up to date, and readily available.external_references idcourse-of-action--e57fe28b-5e46-4e71-868b-928101b0fa9dmodified2022-01-26T16:18:10.237ZnameAutomation Support For Accuracy / Currencytypecourse-of-actionx_mitre_familySecurity Assessment And Authorizationx_mitre_impact x_mitre_priorityP3 external_idCA-5 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.238ZdescriptionThe organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data. Trend analyses can include, for example, examining recent threat information regarding the types of threat events that have occurred within the organization or across the federal government, success rates of certain types of cyber attacks, emerging vulnerabilities in information technologies, evolving social engineering techniques, results from multiple security control assessments, the effectiveness of configuration settings, and findings from Inspectors General or auditors.external_references idcourse-of-action--fdda8535-a439-4717-9005-3d4c5a78aeffmodified2022-01-26T16:18:10.238ZnameTrend Analysestypecourse-of-actionx_mitre_familySecurity Assessment And Authorizationx_mitre_impact x_mitre_priorityP2 external_idCA-7 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.239ZdescriptionThe information system performs security compliance checks on constituent system components prior to the establishment of the internal connection. Security compliance checks may include, for example, verification of the relevant baseline configuration.external_references idcourse-of-action--b7b629e7-5726-41dc-960d-819b9c2f8e2amodified2022-01-26T16:18:10.239ZnameSecurity Compliance Checkstypecourse-of-actionx_mitre_familySecurity Assessment And Authorizationx_mitre_impact x_mitre_priorityP2 external_idCA-9 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.240ZdescriptionThe organization retains [Assignment: organization-defined previous versions of baseline configurations of the information system] to support rollback. Retaining previous versions of baseline configurations to support rollback may include, for example, hardware, software, firmware, configuration files, and configuration records.external_references idcourse-of-action--e6f238bf-6310-4386-92ad-0d654c9d6796modified2022-01-26T16:18:10.240ZnameRetention Of Previous Configurationstypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-2 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.241ZdescriptionThe organization: *CM-3a.Determines the types of changes to the information system that are configuration-controlled; *CM-3b.Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses; *CM-3c.Documents configuration change decisions associated with the information system; *CM-3d.Implements approved configuration-controlled changes to the information system; *CM-3e.Retains records of configuration-controlled changes to the information system for [Assignment: organization-defined time period]; *CM-3f.Audits and reviews activities associated with configuration-controlled changes to the information system; and *CM-3g.Coordinates and provides oversight for configuration change control activities through [Assignment: organization-defined configuration change control element (e.g., committee, board)] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined configuration change conditions]]. Configuration change controls for organizational information systems involve the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled/unauthorized changes, and changes to remediate vulnerabilities. Typical processes for managing configuration changes to information systems include, for example, Configuration Control Boards that approve proposed changes to systems. For new development information systems or systems undergoing major upgrades, organizations consider including representatives from development organizations on the Configuration Control Boards. Auditing of changes includes activities before and after changes are made to organizational information systems and the auditing activities required to implement such changes.external_references idcourse-of-action--bd2f5ba4-e3e1-4f83-8af9-b423ad518e9amodified2022-01-26T16:18:10.241ZnameConfiguration Change Controltypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-3source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.242ZdescriptionThe organization ensures that cryptographic mechanisms used to provide [Assignment: organization-defined security safeguards] are under configuration management. Regardless of the cryptographic means employed (e.g., public key, private key, shared secrets), organizations ensure that there are processes and procedures in place to effectively manage those means. For example, if devices use certificates as a basis for identification and authentication, there needs to be a process in place to address the expiration of those certificates.external_references idcourse-of-action--3dc5d6dd-ec40-47f2-a1d8-0dec8ddaa61bmodified2022-01-26T16:18:10.242ZnameCryptography Managementtypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-3 (6)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.243ZdescriptionThe organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system. Any changes to the hardware, software, and/or firmware components of information systems can potentially have significant effects on the overall security of the systems. Therefore, organizations permit only qualified and authorized individuals to access information systems for purposes of initiating changes, including upgrades and modifications. Organizations maintain records of access to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes. Access restrictions for change also include software libraries. Access restrictions include, for example, physical and logical access controls (see AC-3 and PE-3), workflow automation, media libraries, abstract layers (e.g., changes implemented into third-party interfaces rather than directly into information systems), and change windows (e.g., changes occur only during specified times, making unauthorized changes easy to discover).external_references idcourse-of-action--7ad8f1f3-ca26-493f-a3e8-d46c9339ed1dmodified2022-01-26T16:18:10.243ZnameAccess Restrictions For Changetypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-5source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.244ZdescriptionThe organization limits privileges to change software resident within software libraries. Software libraries include privileged programs.external_references idcourse-of-action--2713f12f-2f42-4869-bc23-a0c62ec4ef6fmodified2022-01-26T16:18:10.244ZnameLimit Library Privilegestypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-5 (6)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.245Zdescription[Withdrawn: Incorporated into SI-7].external_references idcourse-of-action--368f70f7-afaa-4190-93b9-ba19ec3dd69dmodified2022-01-26T16:18:10.245ZnameUnauthorized Change Detectiontypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-6 (3)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.246ZdescriptionThe organization: *CM-7 (4)(a)Identifies [Assignment: organization-defined software programs not authorized to execute on the information system]; *CM-7 (4)(b)Employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system; and *CM-7 (4)(c)Reviews and updates the list of unauthorized software programs [Assignment: organization-defined frequency]. The process used to identify software programs that are not authorized to execute on organizational information systems is commonly referred to as blacklisting. Organizations can implement CM-7 (5) instead of this control enhancement if whitelisting (the stronger of the two policies) is the preferred approach for restricting software program execution.external_references idcourse-of-action--75c5ff27-3eb1-485d-95e8-469615f336fcmodified2022-01-26T16:18:10.246ZnameUnauthorized Software / Blacklistingtypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-7 (4)source_nameNIST 800-53 Revision 4MODERATEcreated2022-01-26T16:18:10.247ZdescriptionThe organization: *CM-8 (3)(a)Employs automated mechanisms [Assignment: organization-defined frequency] to detect the presence of unauthorized hardware, software, and firmware components within the information system; and *CM-8 (3)(b)Takes the following actions when unauthorized components are detected: [Selection (one or more): disables network access by such components; isolates the components; notifies [Assignment: organization-defined personnel or roles]]. This control enhancement is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms can be implemented within information systems or in other separate devices. Isolation can be achieved, for example, by placing unauthorized information system components in separate domains or subnets or otherwise quarantining such components. This type of component isolation is commonly referred to as sandboxing.external_references idcourse-of-action--2ce0bdb7-6ba8-4d10-b16d-876ca596001bmodified2022-01-26T16:18:10.247ZnameAutomated Unauthorized Component Detectiontypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-8 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.248ZdescriptionThe organization: *CM-8 (9)(a)Assigns [Assignment: organization-defined acquired information system components] to an information system; and *CM-8 (9)(b)Receives an acknowledgement from the information system owner of this assignment. Organizations determine the criteria for or types of information system components (e.g., microprocessors, motherboards, software, programmable logic controllers, and network devices) that are subject to this control enhancement.external_references idcourse-of-action--c3ca9150-697d-492e-ade6-1e11e4c22591modified2022-01-26T16:18:10.248ZnameAssignment Of Components To Systemstypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-8 (9)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.249ZdescriptionThe organization: *CM-11a.Establishes [Assignment: organization-defined policies] governing the installation of software by users; *CM-11b.Enforces software installation policies through [Assignment: organization-defined methods]; and *CM-11c.Monitors policy compliance at [Assignment: organization-defined frequency]. If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved �app stores.� Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.external_references idcourse-of-action--e2b61956-3147-417d-82f6-3b79f4a76fcamodified2022-01-26T16:18:10.249ZnameUser-Installed Softwaretypecourse-of-actionx_mitre_familyConfiguration Managementx_mitre_impact x_mitre_priorityP1 external_idCM-11source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.250ZdescriptionThe organization coordinates contingency plan development with organizational elements responsible for related plans. Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, Insider Threat Implementation Plan, and Occupant Emergency Plans.external_references idcourse-of-action--1466df11-11b8-4be6-a879-8e771b41db03modified2022-01-26T16:18:10.250ZnameCoordinate With Related Planstypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-2 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.251ZdescriptionThe organization plans for the transfer of essential missions and business functions to alternate processing and/or storage sites with little or no loss of operational continuity and sustains that continuity through information system restoration to primary processing and/or storage sites. Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Primary processing and/or storage sites defined by organizations as part of contingency planning may change depending on the circumstances associated with the contingency (e.g., backup sites may become primary sites).external_references idcourse-of-action--e871cbdc-f914-458f-bcd8-630598de9baemodified2022-01-26T16:18:10.251ZnameAlternate Processing / Storage Sitetypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-2 (6)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.252ZdescriptionThe organization: *CP-4a.Tests the contingency plan for the information system [Assignment: organization-defined frequency] using [Assignment: organization-defined tests] to determine the effectiveness of the plan and the organizational readiness to execute the plan; *CP-4b.Reviews the contingency plan test results; and *CP-4c.Initiates corrective actions, if needed. Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.external_references idcourse-of-action--b2828bb6-102b-4f0a-b368-b183a1943f1amodified2022-01-26T16:18:10.252ZnameContingency Plan Testingtypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP2 external_idCP-4source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.253ZdescriptionThe organization: *CP-6a.Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and *CP-6b.Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site. Alternate storage sites are sites that are geographically distinct from primary storage sites. An alternate storage site maintains duplicate copies of information and data in the event that the primary storage site is not available. Items covered by alternate storage site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination of delivery/retrieval of backup media. Alternate storage sites reflect the requirements in contingency plans so that organizations can maintain essential missions/business functions despite disruption, compromise, or failure in organizational information systems.external_references idcourse-of-action--aa317f08-5a4a-49c6-b961-4c590ba7d713modified2022-01-26T16:18:10.253ZnameAlternate Storage Sitetypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-6source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.254ZdescriptionThe organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats. Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.external_references idcourse-of-action--8e07fea9-b559-44ef-81f6-b16ad7ef8487modified2022-01-26T16:18:10.254ZnameSeparation From Primary Sitetypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-7 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.255ZdescriptionThe organization establishes alternate telecommunications services including necessary agreements to permit the resumption of [Assignment: organization-defined information system operations] for essential missions and business functions within [Assignment: organization-defined time period] when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites. This control applies to telecommunications services (data and voice) for primary and alternate processing and storage sites. Alternate telecommunications services reflect the continuity requirements in contingency plans to maintain essential missions/business functions despite the loss of primary telecommunications services. Organizations may specify different time periods for primary/alternate sites. Alternate telecommunications services include, for example, additional organizational or commercial ground-based circuits/lines or satellites in lieu of ground-based communications. Organizations consider factors such as availability, quality of service, and access when entering into alternate telecommunications agreements.external_references idcourse-of-action--11329cd2-a88f-4362-903c-08cb6324a816modified2022-01-26T16:18:10.255ZnameTelecommunications Servicestypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-8source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.256ZdescriptionThe organization tests alternate telecommunication services [Assignment: organization-defined frequency].external_references idcourse-of-action--9a62657c-2c73-463b-b379-18783ed69cc1modified2022-01-26T16:18:10.256ZnameAlternate Telecommunication Service Testingtypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-8 (5)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.257ZdescriptionThe organization transfers information system backup information to the alternate storage site [Assignment: organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives]. Information system backup information can be transferred to alternate storage sites either electronically or by physical shipment of storage media.external_references idcourse-of-action--106033ba-021f-4cb9-bbbb-e44235f5f350modified2022-01-26T16:18:10.257ZnameTransfer To Alternate Storage Sitetypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-9 (5)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.258ZdescriptionThe information system implements transaction recovery for systems that are transaction-based. Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling.external_references idcourse-of-action--7b67d1f5-30a5-4963-8060-1f17d7282689modified2022-01-26T16:18:10.258ZnameTransaction Recoverytypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-10 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.259ZdescriptionThe organization protects backup and restoration hardware, firmware, and software. Protection of backup and restoration hardware, firmware, and software components includes both physical and technical safeguards. Backup and restoration software includes, for example, router tables, compilers, and other security-relevant system software.external_references idcourse-of-action--b0094350-6579-4a6b-a2ed-de97a986d8a5modified2022-01-26T16:18:10.259ZnameComponent Protectiontypecourse-of-actionx_mitre_familyContingency Planningx_mitre_impact x_mitre_priorityP1 external_idCP-10 (6)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.260ZdescriptionThe information system implements multifactor authentication for network access to privileged accounts.external_references idcourse-of-action--8787d15a-d379-464b-8361-df5d84a4afbcmodified2022-01-26T16:18:10.260ZnameNetwork Access To Privileged Accountstypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-2 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.261ZdescriptionThe information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].external_references idcourse-of-action--d7fd85dd-a5de-4495-b03a-1ff7b2cfed6dmodified2022-01-26T16:18:10.261ZnameNetwork Access To Non-Privileged Accounts - Separate Devicetypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-2 (7)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.262ZdescriptionThe information system accepts and electronically verifies Personal Identity Verification (PIV) credentials. This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.external_references idcourse-of-action--7066d847-7bbe-4c1f-bed1-b5d12d046ebcmodified2022-01-26T16:18:10.262ZnameAcceptance Of Piv Credentialstypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-2 (12)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.263ZdescriptionThe organization ensures that device identification and authentication based on attestation is handled by [Assignment: organization-defined configuration management process]. Device attestation refers to the identification and authentication of a device based on its configuration and known operating state. This might be determined via some cryptographic hash of the device. If device attestation is the means of identification and authentication, then it is important that patches and updates to the device are handled via a configuration management process such that the those patches/updates are done securely and at the same time do not disrupt the identification and authentication to other devices.external_references idcourse-of-action--e1e50030-2fd7-4509-81b5-88456616a447modified2022-01-26T16:18:10.263ZnameDevice Attestationtypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-3 (4)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.264ZdescriptionThe organization manages individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status]. Characteristics identifying the status of individuals include, for example, contractors and foreign nationals. Identifying the status of individuals by specific characteristics provides additional information about the people with whom organizational personnel are communicating. For example, it might be useful for a government employee to know that one of the individuals on an email message is a contractor.external_references idcourse-of-action--8f48c1a8-8e70-46ad-abdc-3b6a3ab31cd3modified2022-01-26T16:18:10.264ZnameIdentify User Statustypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-4 (4)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.265ZdescriptionThe information system, for password-based authentication: *IA-5 (1)(a)Enforces minimum password complexity of [Assignment: organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type]; *IA-5 (1)(b)Enforces at least the following number of changed characters when new passwords are created: [Assignment: organization-defined number]; *IA-5 (1)(c)Stores and transmits only cryptographically-protected passwords; *IA-5 (1)(d)Enforces password minimum and maximum lifetime restrictions of [Assignment: organization-defined numbers for lifetime minimum, lifetime maximum]; *IA-5 (1)(e)Prohibits password reuse for [Assignment: organization-defined number] generations; and *IA-5 (1)(f)Allows the use of a temporary password for system logons with an immediate change to a permanent password. This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.external_references idcourse-of-action--63ede202-e4fc-477f-a602-0e9cea8bc447modified2022-01-26T16:18:10.265ZnamePassword-Based Authenticationtypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-5 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.266ZdescriptionThe organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys. Organizations exercise caution in determining whether embedded or stored authenticators are in encrypted or unencrypted form. If authenticators are used in the manner stored, then those representations are considered unencrypted authenticators. This is irrespective of whether that representation is perhaps an encrypted version of something else (e.g., a password).external_references idcourse-of-action--2b92ef96-8a1a-41d7-bdba-06ed6d41e310modified2022-01-26T16:18:10.266ZnameNo Embedded Unencrypted Static Authenticatorstypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-5 (7)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.267ZdescriptionThe information system, for biometric-based authentication, employs mechanisms that satisfy [Assignment: organization-defined biometric quality requirements]. Unlike password-based authentication which provides exact matches of user-input passwords to stored passwords, biometric authentication does not provide such exact matches. Depending upon the type of biometric and the type of collection mechanism, there is likely to be some divergence from the presented biometric and stored biometric which serves as the basis of comparison. There will likely be both false positives and false negatives when making such comparisons. The rate at which the false accept and false reject rates are equal is known as the crossover rate. Biometric quality requirements include, for example, acceptable crossover rates, as that essentially reflects the accuracy of the biometric.external_references idcourse-of-action--8ccb1756-5ccb-4d4a-a933-40944cb48227modified2022-01-26T16:18:10.267ZnameBiometric-Based Authenticationtypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-5 (12)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.268ZdescriptionThe information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users). Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.external_references idcourse-of-action--a06b165d-e478-43cf-86a2-d7c1a1ccc2d9modified2022-01-26T16:18:10.268ZnameIdentification And Authentication (Non-Organizational Users)typecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP1 external_idIA-8source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.269ZdescriptionThe organization identifies and authenticates [Assignment: organization-defined information system services] using [Assignment: organization-defined security safeguards]. This control supports service-oriented architectures and other distributed architectural approaches requiring the identification and authentication of information system services. In such architectures, external services often appear dynamically. Therefore, information systems should be able to determine in a dynamic manner, if external providers and associated services are authentic. Safeguards implemented by organizational information systems to validate provider and service authenticity include, for example, information or code signing, provenance graphs, and/or electronic signatures indicating or including the sources of services.external_references idcourse-of-action--861c9068-0fe5-4750-99fc-9ec51fbf1edfmodified2022-01-26T16:18:10.269ZnameService Identification And Authenticationtypecourse-of-actionx_mitre_familyIdentification And Authenticationx_mitre_impact x_mitre_priorityP0 external_idIA-9source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.270ZdescriptionThe organization: *IR-1a.Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: *IR-1a.1.An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and *IR-1a.2.Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and *IR-1b.Reviews and updates the current: *IR-1b.1.Incident response policy [Assignment: organization-defined frequency]; and *IR-1b.2.Incident response procedures [Assignment: organization-defined frequency]. This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.external_references idcourse-of-action--a5ad7e33-7636-48fd-88f3-b1be435ab439modified2022-01-26T16:18:10.270ZnameIncident Response Policy And Procedurestypecourse-of-actionx_mitre_familyIncident Responsex_mitre_impact x_mitre_priorityP1 external_idIR-1source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.271ZdescriptionThe organization employs automated mechanisms to more thoroughly and effectively test the incident response capability. Organizations use automated mechanisms to more thoroughly and effectively test incident response capabilities, for example: (i) by providing more complete coverage of incident response issues; (ii) by selecting more realistic test scenarios and test environments; and (iii) by stressing the response capability.external_references idcourse-of-action--a0223fb5-71b2-40bf-aacd-e584812a94fbmodified2022-01-26T16:18:10.271ZnameAutomated Testingtypecourse-of-actionx_mitre_familyIncident Responsex_mitre_impact x_mitre_priorityP2 external_idIR-3 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.272ZdescriptionThe organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response. Sometimes the nature of a threat event, for example, a hostile cyber attack, is such that it can only be observed by bringing together information from different sources including various reports and reporting procedures established by organizations.external_references idcourse-of-action--5671cc38-a114-4d53-9123-37a41fa75076modified2022-01-26T16:18:10.272ZnameInformation Correlationtypecourse-of-actionx_mitre_familyIncident Responsex_mitre_impact x_mitre_priorityP1 external_idIR-4 (4)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.273ZdescriptionThe organization coordinates incident handling activities involving supply chain events with other organizations involved in the supply chain. Organizations involved in supply chain activities include, for example, system/product developers, integrators, manufacturers, packagers, assemblers, distributors, vendors, and resellers. Supply chain incidents include, for example, compromises/breaches involving information system components, information technology products, development processes or personnel, and distribution processes or warehousing facilities.external_references idcourse-of-action--54c2485e-aac0-4325-bebd-d7157263521bmodified2022-01-26T16:18:10.273ZnameSupply Chain Coordinationtypecourse-of-actionx_mitre_familyIncident Responsex_mitre_priorityP1 external_idIR-4 (10)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.274ZdescriptionThe organization reports information system vulnerabilities associated with reported security incidents to [Assignment: organization-defined personnel or roles].external_references idcourse-of-action--0dcd5169-9075-46ab-adad-628fa8179081modified2022-01-26T16:18:10.274ZnameVulnerabilities Related To Incidentstypecourse-of-actionx_mitre_familyIncident Responsex_mitre_impact x_mitre_priorityP1 external_idIR-6 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.275ZdescriptionThe organization responds to information spills by: *IR-9a.Identifying the specific information involved in the information system contamination; *IR-9b.Alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill; *IR-9c.Isolating the contaminated information system or system component; *IR-9d.Eradicating the information from the contaminated information system or component; *IR-9e.Identifying other information systems or system components that may have been subsequently contaminated; and *IR-9f.Performing other [Assignment: organization-defined actions]. Information spillage refers to instances where either classified or sensitive information is inadvertently placed on information systems that are not authorized to process such information. Such information spills often occur when information that is initially thought to be of lower sensitivity is transmitted to an information system and then is subsequently determined to be of higher sensitivity. At that point, corrective action is required. The nature of the organizational response is generally based upon the degree of sensitivity of the spilled information (e.g., security category or classification level), the security capabilities of the information system, the specific nature of contaminated storage media, and the access authorizations (e.g., security clearances) of individuals with authorized access to the contaminated system. The methods used to communicate information about the spill after the fact do not involve methods directly associated with the actual spill to minimize the risk of further spreading the contamination before such contamination is isolated and eradicated.external_references idcourse-of-action--6ee63e51-c922-4be9-8097-ece537bf346emodified2022-01-26T16:18:10.275ZnameInformation Spillage Responsetypecourse-of-actionx_mitre_familyIncident Responsex_mitre_impact x_mitre_priorityP0 external_idIR-9source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.276ZdescriptionThe organization establishes an integrated team of forensic/malicious code analysts, tool developers, and real-time operations personnel. Having an integrated team for incident response facilitates information sharing. Such capability allows organizational personnel, including developers, implementers, and operators, to leverage the team knowledge of the threat in order to implement defensive measures that will enable organizations to deter intrusions more effectively. Moreover, it promotes the rapid detection of intrusions, development of appropriate mitigations, and the deployment of effective defensive measures. For example, when an intrusion is detected, the integrated security analysis team can rapidly develop an appropriate response for operators to implement, correlate the new incident with information on past intrusions, and augment ongoing intelligence development. This enables the team to identify adversary TTPs that are linked to the operations tempo or to specific missions/business functions, and to define responsive actions in a way that does not disrupt the mission/business operations. Ideally, information security analysis teams are distributed within organizations to make the capability more resilient.external_references idcourse-of-action--84d891ac-751a-4037-96b7-60fb9235f95amodified2022-01-26T16:18:10.276ZnameIntegrated Information Security Analysis Teamtypecourse-of-actionx_mitre_familyIncident Responsex_mitre_priorityP0 external_idIR-10source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.277ZdescriptionThe organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications. If, upon inspection of maintenance tools, organizations determine that the tools have been modified in an improper/unauthorized manner or contain malicious code, the incident is handled consistent with organizational policies and procedures for incident handling.external_references idcourse-of-action--28c62dc0-1fae-456a-8fab-862cd675d56bmodified2022-01-26T16:18:10.277ZnameInspect Toolstypecourse-of-actionx_mitre_familyMaintenancex_mitre_impact x_mitre_priorityP3 external_idMA-3 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.278ZdescriptionThe organization: *MA-4 (1)(a)Audits nonlocal maintenance and diagnostic sessions [Assignment: organization-defined audit events]; and *MA-4 (1)(b)Reviews the records of the maintenance and diagnostic sessions.external_references idcourse-of-action--2f44246f-36ac-4260-8fe2-e56365c5cb92modified2022-01-26T16:18:10.278ZnameAuditing And Reviewtypecourse-of-actionx_mitre_familyMaintenancex_mitre_impact x_mitre_priorityP2 external_idMA-4 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.279ZdescriptionThe information system implements remote disconnect verification at the termination of nonlocal maintenance and diagnostic sessions. Remote disconnect verification ensures that remote connections from nonlocal maintenance sessions have been terminated and are no longer available for use.external_references idcourse-of-action--6707b970-997d-42b7-aee0-2a9cb7407c37modified2022-01-26T16:18:10.279ZnameRemote Disconnect Verificationtypecourse-of-actionx_mitre_familyMaintenancex_mitre_impact x_mitre_priorityP2 external_idMA-4 (7)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.280ZdescriptionThe organization ensures that: *MA-5 (4)(a)Cleared foreign nationals (i.e., foreign nationals with appropriate security clearances), are used to conduct maintenance and diagnostic activities on classified information systems only when the systems are jointly owned and operated by the United States and foreign allied governments, or owned and operated solely by foreign allied governments; and *MA-5 (4)(b)Approvals, consents, and detailed operational conditions regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified information systems are fully documented within Memoranda of Agreements.external_references idcourse-of-action--748982dd-8af7-4b37-b19a-1085ba6751e7modified2022-01-26T16:18:10.280ZnameForeign Nationalstypecourse-of-actionx_mitre_familyMaintenancex_mitre_impact x_mitre_priorityP2 external_idMA-5 (4)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.281ZdescriptionThe organization: *MP-1a.Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: *MP-1a.1.A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and *MP-1a.2.Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and *MP-1b.Reviews and updates the current: *MP-1b.1.Media protection policy [Assignment: organization-defined frequency]; and *MP-1b.2.Media protection procedures [Assignment: organization-defined frequency]. This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.external_references idcourse-of-action--40b34e90-5e3f-4d82-8d5b-2d5f4a4b4c58modified2022-01-26T16:18:10.281ZnameMedia Protection Policy And Procedurestypecourse-of-actionx_mitre_familyMedia Protectionx_mitre_impact x_mitre_priorityP1 external_idMP-1source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.282Zdescription[Withdrawn: Incorporated into SC-28 (1)].external_references idcourse-of-action--b1072079-1029-4159-8694-2d494094a05dmodified2022-01-26T16:18:10.282ZnameCryptographic Protectiontypecourse-of-actionx_mitre_familyMedia Protectionx_mitre_impact x_mitre_priorityP1 external_idMP-4 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.283ZdescriptionThe organization employs an identified custodian during transport of information system media outside of controlled areas. Identified custodians provide organizations with specific points of contact during the media transport process and facilitate individual accountability. Custodial responsibilities can be transferred from one individual to another as long as an unambiguous custodian is identified at all times.external_references idcourse-of-action--dc5d2f19-6615-4a80-8ed0-2846419bb614modified2022-01-26T16:18:10.283ZnameCustodianstypecourse-of-actionx_mitre_familyMedia Protectionx_mitre_impact x_mitre_priorityP1 external_idMP-5 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.284Zdescription[Withdrawn: Incorporated into MP-6].external_references idcourse-of-action--7415aa8c-c722-44b1-b6c2-efe0ce302a4dmodified2022-01-26T16:18:10.284ZnameControlled Unclassified Informationtypecourse-of-actionx_mitre_familyMedia Protectionx_mitre_impact x_mitre_priorityP1 external_idMP-6 (4)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.285ZdescriptionThe organization [Selection: restricts; prohibits] the use of [Assignment: organization-defined types of information system media] on [Assignment: organization-defined information systems or system components] using [Assignment: organization-defined security safeguards]. Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.external_references idcourse-of-action--dfc3eaf2-0693-4220-b193-8069a88c5dcamodified2022-01-26T16:18:10.285ZnameMedia Usetypecourse-of-actionx_mitre_familyMedia Protectionx_mitre_impact x_mitre_priorityP1 external_idMP-7source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.286ZdescriptionThe organization employs [Assignment: organization-defined tests] of downgrading equipment and procedures to verify correct performance [Assignment: organization-defined frequency].external_references idcourse-of-action--72bbf195-3042-4447-a7be-4f1242fe8a14modified2022-01-26T16:18:10.286ZnameEquipment Testingtypecourse-of-actionx_mitre_familyMedia Protectionx_mitre_impact x_mitre_priorityP0 external_idMP-8 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.287ZdescriptionThe organization requires two forms of identification from [Assignment: organization-defined list of acceptable forms of identification] for visitor access to the facility where the information system resides. Acceptable forms of government photo identification include, for example, passports, Personal Identity Verification (PIV) cards, and drivers� licenses. In the case of gaining access to facilities using automated mechanisms, organizations may use PIV cards, key cards, PINs, and biometrics.external_references idcourse-of-action--e9d25178-4c02-468c-b588-04c80569d0fdmodified2022-01-26T16:18:10.287ZnameTwo Forms Of Identificationtypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-2 (2)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.288ZdescriptionThe organization employs guards and/or alarms to monitor every physical access point to the facility where the information system resides 24 hours per day, 7 days per week.external_references idcourse-of-action--d1e3ef23-825b-45c8-a266-1a00bdb583e3modified2022-01-26T16:18:10.288ZnameContinuous Guards / Alarms / Monitoringtypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-3 (3)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.289ZdescriptionThe organization: *PE-5 (1)(a)Controls physical access to output from [Assignment: organization-defined output devices]; and *PE-5 (1)(b)Ensures that only authorized individuals receive output from the device. Controlling physical access to selected output devices includes, for example, placing printers, copiers, and facsimile machines in controlled areas with keypad access controls or limiting access to individuals with certain types of badges.external_references idcourse-of-action--a9f568c0-abdf-4b28-ba3a-91b8be3f7275modified2022-01-26T16:18:10.289ZnameAccess To Output By Authorized Individualstypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP2 external_idPE-5 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.290ZdescriptionThe organization employs video surveillance of [Assignment: organization-defined operational areas] and retains video recordings for [Assignment: organization-defined time period]. This control enhancement focuses on recording surveillance video for purposes of subsequent review, if circumstances so warrant (e.g., a break-in detected by other means). It does not require monitoring surveillance video although organizations may choose to do so. Note that there may be legal considerations when performing and retaining video surveillance, especially if such surveillance is in a public location.external_references idcourse-of-action--6b5807df-c0f0-4ec3-a2a7-06dfedfb07abmodified2022-01-26T16:18:10.290ZnameVideo Surveillancetypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-6 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.291Zdescription[Withdrawn: Incorporated into PE-2].external_references idcourse-of-action--37e38193-e8f6-4b61-9eb9-b26f72e45ebbmodified2022-01-26T16:18:10.291ZnamePhysical Access Recordstypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP3 external_idPE-8 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.292ZdescriptionThe organization employs redundant power cabling paths that are physically separated by [Assignment: organization-defined distance]. Physically separate, redundant power cables help to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged.external_references idcourse-of-action--51eae4ec-eb94-4e5a-844d-910230d8a0c3modified2022-01-26T16:18:10.292ZnameRedundant Cablingtypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-9 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.293ZdescriptionThe organization provides a long-term alternate power supply for the information system that is: *PE-11 (2)(a)Self-contained; *PE-11 (2)(b)Not reliant on external power generation; and *PE-11 (2)(c)Capable of maintaining [Selection: minimally required operational capability; full operational capability] in the event of an extended loss of the primary power source. This control enhancement can be satisfied, for example, by the use of one or more generators with sufficient capacity to meet the needs of the organization. Long-term alternate power supplies for organizational information systems are either manually or automatically activated.external_references idcourse-of-action--bcb3b169-e683-4ca6-b1de-200070d3ac48modified2022-01-26T16:18:10.293ZnameLong-Term Alternate Power Supply - Self-Containedtypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-11 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.294ZdescriptionThe organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation to Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders]. Organizations can identify specific personnel, roles, and emergency responders in the event that individuals on the notification list must have appropriate access authorizations and/or clearances, for example, to obtain access to facilities where classified operations are taking place or where there are information systems containing classified information.external_references idcourse-of-action--14daa5a1-3232-4a9d-963e-c29926446623modified2022-01-26T16:18:10.294ZnameSuppression Devices / Systemstypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-13 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.295ZdescriptionThe organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel. This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.external_references idcourse-of-action--c7499504-a637-46fe-a874-bf4aacd879d6modified2022-01-26T16:18:10.295ZnameWater Damage Protectiontypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP1 external_idPE-15source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.296ZdescriptionThe organization protects the information system from information leakage due to electromagnetic signals emanations. Information leakage is the intentional or unintentional release of information to an untrusted environment from electromagnetic signals emanations. Security categories or classifications of information systems (with respect to confidentiality) and organizational security policies guide the selection of security controls employed to protect systems against information leakage due to electromagnetic signals emanations.external_references idcourse-of-action--85929f2a-d0f8-4eb4-a5cd-d9ae7c08748fmodified2022-01-26T16:18:10.296ZnameInformation Leakagetypecourse-of-actionx_mitre_familyPhysical And Environmental Protectionx_mitre_impact x_mitre_priorityP0 external_idPE-19source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.297ZdescriptionThe organization: *PL-2a.Develops a security plan for the information system that: *PL-2a.1.Is consistent with the organization�s enterprise architecture; *PL-2a.2.Explicitly defines the authorization boundary for the system; *PL-2a.3.Describes the operational context of the information system in terms of missions and business processes; *PL-2a.4.Provides the security categorization of the information system including supporting rationale; *PL-2a.5.Describes the operational environment for the information system and relationships with or connections to other information systems; *PL-2a.6.Provides an overview of the security requirements for the system; *PL-2a.7.Identifies any relevant overlays, if applicable; *PL-2a.8.Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and *PL-2a.9.Is reviewed and approved by the authorizing official or designated representative prior to plan implementation; *PL-2b.Distributes copies of the security plan and communicates subsequent changes to the plan to [Assignment: organization-defined personnel or roles]; *PL-2c.Reviews the security plan for the information system [Assignment: organization-defined frequency]; *PL-2d.Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments; and *PL-2e.Protects the security plan from unauthorized disclosure and modification. Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.external_references idcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dmodified2022-01-26T16:18:10.297ZnameSystem Security Plantypecourse-of-actionx_mitre_familyPlanningx_mitre_impact x_mitre_priorityP1 external_idPL-2source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.298ZdescriptionThe organization includes in the rules of behavior, explicit restrictions on the use of social media/networking sites and posting organizational information on public websites. This control enhancement addresses rules of behavior related to the use of social media/networking sites: (i) when organizational personnel are using such sites for official duties or in the conduct of official business; (ii) when organizational information is involved in social media/networking transactions; and (iii) when personnel are accessing social media/networking sites from organizational information systems. Organizations also address specific rules that prevent unauthorized entities from obtaining and/or inferring non-public organizational information (e.g., system account information, personally identifiable information) from social media/networking sites.external_references idcourse-of-action--074e7d25-82e2-450b-a659-e76c546f00f9modified2022-01-26T16:18:10.298ZnameSocial Media And Networking Restrictionstypecourse-of-actionx_mitre_familyPlanningx_mitre_impact x_mitre_priorityP2 external_idPL-4 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.299ZdescriptionThe organization designs its security architecture using a defense-in-depth approach that: *PL-8 (1)(a)Allocates [Assignment: organization-defined security safeguards] to [Assignment: organization-defined locations and architectural layers]; and *PL-8 (1)(b)Ensures that the allocated security safeguards operate in a coordinated and mutually reinforcing manner. Organizations strategically allocate security safeguards (procedural, technical, or both) in the security architecture so that adversaries have to overcome multiple safeguards to achieve their objective. Requiring adversaries to defeat multiple mechanisms makes it more difficult to successfully attack critical information resources (i.e., increases adversary work factor) and also increases the likelihood of detection. The coordination of allocated safeguards is essential to ensure that an attack that involves one safeguard does not create adverse unintended consequences (e.g., lockout, cascading alarms) by interfering with another safeguard. Placement of security safeguards is a key activity. Greater asset criticality or information value merits additional layering. Thus, an organization may choose to place anti-virus software at organizational boundary layers, email/web servers, notebook computers, and workstations to maximize the number of related safeguards adversaries must penetrate before compromising the information and information systems.external_references idcourse-of-action--593413b8-63c5-4a61-ab7a-9579d1dab314modified2022-01-26T16:18:10.299ZnameDefense-In-Depthtypecourse-of-actionx_mitre_familyPlanningx_mitre_impact x_mitre_priorityP1 external_idPL-8 (1)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.300ZdescriptionThe organization ensures that individuals accessing an information system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.external_references idcourse-of-action--47b72c02-a187-4b0a-a209-7fb0876c2a86modified2022-01-26T16:18:10.300ZnameClassified Informationtypecourse-of-actionx_mitre_familyPersonnel Securityx_mitre_impact x_mitre_priorityP1 external_idPS-3 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.301ZdescriptionThe organization employs automated mechanisms to notify [Assignment: organization-defined personnel or roles] upon termination of an individual. In organizations with a large number of employees, not all personnel who need to know about termination actions receive the appropriate notifications�or, if such notifications are received, they may not occur in a timely manner. Automated mechanisms can be used to send automatic alerts or notifications to specific organizational personnel or roles (e.g., management personnel, supervisors, personnel security officers, information security officers, systems administrators, or information technology administrators) when individuals are terminated. Such automatic alerts or notifications can be conveyed in a variety of ways, including, for example, telephonically, via electronic mail, via text message, or via websites.external_references idcourse-of-action--7623da23-af46-402f-82be-c8a08c033b14modified2022-01-26T16:18:10.301ZnameAutomated Notificationtypecourse-of-actionx_mitre_familyPersonnel Securityx_mitre_impact x_mitre_priorityP1 external_idPS-4 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.302ZdescriptionThe organization: *PS-7a.Establishes personnel security requirements including security roles and responsibilities for third-party providers; *PS-7b.Requires third-party providers to comply with personnel security policies and procedures established by the organization; *PS-7c.Documents personnel security requirements; *PS-7d.Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [Assignment: organization-defined time period]; and *PS-7e.Monitors provider compliance. Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials/privileges associated with individuals transferred or terminated.external_references idcourse-of-action--0229fb27-b993-4622-960e-7d023e7a1825modified2022-01-26T16:18:10.302ZnameThird-Party Personnel Securitytypecourse-of-actionx_mitre_familyPersonnel Securityx_mitre_impact x_mitre_priorityP1 external_idPS-7source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.303Zdescription[Withdrawn: Incorporated into RA-3].external_references idcourse-of-action--c428b4ad-8e1f-4f73-947c-be76acabae03modified2022-01-26T16:18:10.303ZnameRisk Assessment Updatetypecourse-of-actionx_mitre_familyRisk Assessmentx_mitre_impact x_mitre_priorityP1 external_idRA-4source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.304ZdescriptionThe organization determines what information about the information system is discoverable by adversaries and subsequently takes [Assignment: organization-defined corrective actions]. Discoverable information includes information that adversaries could obtain without directly compromising or breaching the information system, for example, by collecting information the system is exposing or by conducting extensive searches of the web. Corrective actions can include, for example, notifying appropriate organizational personnel, removing designated information, or changing the information system to make designated information less relevant or attractive to adversaries.external_references idcourse-of-action--1c0b4206-3605-4412-9526-8c3bd1e9e73emodified2022-01-26T16:18:10.304ZnameDiscoverable Informationtypecourse-of-actionx_mitre_familyRisk Assessmentx_mitre_impact x_mitre_priorityP1 external_idRA-5 (4)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.305Zdescription[Withdrawn: Incorporated into CA-8].external_references idcourse-of-action--081334be-dc45-4e67-a83e-7129ea6d7793modified2022-01-26T16:18:10.305ZnamePenetration Testing And Analysestypecourse-of-actionx_mitre_familyRisk Assessmentx_mitre_impact x_mitre_priorityP1 external_idRA-5 (9)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.306ZdescriptionThe organization: *SA-3a.Manages the information system using [Assignment: organization-defined system development life cycle] that incorporates information security considerations; *SA-3b.Defines and documents information security roles and responsibilities throughout the system development life cycle; *SA-3c.Identifies individuals having information security roles and responsibilities; and *SA-3d.Integrates the organizational information security risk management process into system development life cycle activities. A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.external_references idcourse-of-action--0fb8943a-feaf-43e0-bf8a-255df11f0aa4modified2022-01-26T16:18:10.306ZnameSystem Development Life Cycletypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-3source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.307ZdescriptionThe organization requires the developer of the information system, system component, or information system service to demonstrate the use of a system development life cycle that includes [Assignment: organization-defined state-of-the-practice system/security engineering methods, software development methods, testing/evaluation/validation techniques, and quality control processes]. Following a well-defined system development life cycle that includes state-of-the-practice software development methods, systems/security engineering methods, quality control processes, and testing, evaluation, and validation techniques helps to reduce the number and severity of latent errors within information systems, system components, and information system services. Reducing the number/severity of such errors reduces the number of vulnerabilities in those systems, components, and services.external_references idcourse-of-action--14372b11-9b58-4bb2-9388-dcad989cdbd2modified2022-01-26T16:18:10.307ZnameDevelopment Methods / Techniques / Practicestypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-4 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.308ZdescriptionThe organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use. The identification of functions, ports, protocols, and services early in the system development life cycle (e.g., during the initial requirements definition and design phases) allows organizations to influence the design of the information system, information system component, or information system service. This early involvement in the life cycle helps organizations to avoid or minimize the use of functions, ports, protocols, or services that pose unnecessarily high risks and understand the trade-offs involved in blocking specific ports, protocols, or services (or when requiring information system service providers to do so). Early identification of functions, ports, protocols, and services avoids costly retrofitting of security controls after the information system, system component, or information system service has been implemented. SA-9 describes requirements for external information system services with organizations identifying which functions, ports, protocols, and services are provided from external sources.external_references idcourse-of-action--847e79cd-b67f-4a61-b899-36cb9a4900d8modified2022-01-26T16:18:10.308ZnameFunctions / Ports / Protocols / Services In Usetypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-4 (9)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.309Zdescription[Withdrawn: Incorporated into SA-4 (2)].external_references idcourse-of-action--4871e928-e6ca-4ba9-925f-a2380b41f523modified2022-01-26T16:18:10.309ZnameHigh-Level Designtypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP2 external_idSA-5 (3)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.310ZdescriptionThe organization: *SA-9a.Requires that providers of external information system services comply with organizational information security requirements and employ [Assignment: organization-defined security controls] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance; *SA-9b.Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and *SA-9c.Employs [Assignment: organization-defined processes, methods, and techniques] to monitor security control compliance by external service providers on an ongoing basis. External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.external_references idcourse-of-action--0f08ecd2-4dfe-4cc3-9986-d65a182a9486modified2022-01-26T16:18:10.310ZnameExternal Information System Servicestypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-9source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.311ZdescriptionThe organization restricts the location of [Selection (one or more): information processing; information/data; information system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions]. The location of information processing, information/data storage, or information system services that are critical to organizations can have a direct impact on the ability of those organizations to successfully execute their missions/business functions. This situation exists when external providers control the location of processing, storage or services. The criteria external providers use for the selection of processing, storage, or service locations may be different from organizational criteria. For example, organizations may want to ensure that data/information storage locations are restricted to certain locations to facilitate incident response activities (e.g., forensic analyses, after-the-fact investigations) in case of information security breaches/compromises. Such incident response activities may be adversely affected by the governing laws or protocols in the locations where processing and storage occur and/or the locations from which information system services emanate.external_references idcourse-of-action--2f851c32-589c-488c-a7d3-9436ce0f4dbfmodified2022-01-26T16:18:10.311ZnameProcessing, Storage, And Service Locationtypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-9 (5)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.312ZdescriptionThe organization requires the developer of the information system, system component, or information system service to maintain the integrity of the mapping between the master build data (hardware drawings and software/firmware code) describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version. This control enhancement addresses changes to hardware, software, and firmware components during initial development and during system life cycle updates. Maintaining the integrity between the master copies of security-relevant hardware, software, and firmware (including designs and source code) and the equivalent data in master copies on-site in operational environments is essential to ensure the availability of organizational information systems supporting critical missions and/or business functions.external_references idcourse-of-action--e3153cad-f8fe-4acc-94d0-dcb8c04a71fdmodified2022-01-26T16:18:10.312ZnameMapping Integrity For Version Controltypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-10 (5)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.313ZdescriptionThe organization requires the developer of the information system, system component, or information system service to perform a manual code review of [Assignment: organization-defined specific code] using [Assignment: organization-defined processes, procedures, and/or techniques]. Manual code reviews are usually reserved for the critical software and firmware components of information systems. Such code reviews are uniquely effective at identifying weaknesses that require knowledge of the application�s requirements or context which are generally unavailable to more automated analytic tools and techniques such as static or dynamic analysis. Components benefiting from manual review include for example, verifying access control matrices against application controls and reviewing more detailed aspects of cryptographic implementations and controls.external_references idcourse-of-action--5b8cb01b-5fef-4d1e-a886-bed0755990f7modified2022-01-26T16:18:10.313ZnameManual Code Reviewstypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-11 (4)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.314ZdescriptionThe organization protects against supply chain threats to the information system, system component, or information system service by employing [Assignment: organization-defined security safeguards] as part of a comprehensive, defense-in-breadth information security strategy. Information systems (including system components that compose those systems) need to be protected throughout the system development life cycle (i.e., during design, development, manufacturing, packaging, assembly, distribution, system integration, operations, maintenance, and retirement). Protection of organizational information systems is accomplished through threat awareness, by the identification, management, and reduction of vulnerabilities at each phase of the life cycle and the use of complementary, mutually reinforcing strategies to respond to risk. Organizations consider implementing a standardized process to address supply chain risk with respect to information systems and system components, and to educate the acquisition workforce on threats, risk, and required security controls. Organizations use the acquisition/procurement processes to require supply chain entities to implement necessary security safeguards to: (i) reduce the likelihood of unauthorized modifications at each stage in the supply chain; and (ii) protect information systems and information system components, prior to taking delivery of such systems/components. This control also applies to information system services. Security safeguards include, for example: (i) security controls for development systems, development facilities, and external connections to development systems; (ii) vetting development personnel; and (iii) use of tamper-evident packaging during shipping/warehousing. Methods for reviewing and protecting development plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.external_references idcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80modified2022-01-26T16:18:10.314ZnameSupply Chain Protectiontypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-12source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.315Zdescription[Withdrawn: Incorporated into SA-12 (1)].external_references idcourse-of-action--c96836a9-d72d-4b1a-a480-d12e81137251modified2022-01-26T16:18:10.315ZnameMinimizing Procurement Timetypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP1 external_idSA-12 (6)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.316ZdescriptionThe organization employs [Selection (one or more): organizational analysis, independent third-party analysis, organizational penetration testing, independent third-party penetration testing] of [Assignment: organization-defined supply chain elements, processes, and actors] associated with the information system, system component, or information system service. This control enhancement addresses analysis and/or testing of the supply chain, not just delivered items. Supply chain elements are information technology products or product components that contain programmable logic and that are critically important to information system functions. Supply chain processes include, for example: (i) hardware, software, and firmware development processes; (ii) shipping/handling procedures; (iii) personnel and physical security programs; (iv) configuration management tools/measures to maintain provenance; or (v) any other programs, processes, or procedures associated with the production/distribution of supply chain elements. Supply chain actors are individuals with specific roles and responsibilities in the supply chain. The evidence generated during analyses and testing of supply chain elements, processes, and actors is documented and used to inform organizational risk management activities and decisions.external_references idcourse-of-action--fa5dc6a2-f079-4266-9d13-3bcb8874570fmodified2022-01-26T16:18:10.316ZnamePenetration Testing / Analysis Of Elements, Processes, And Actorstypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP1 external_idSA-12 (11)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.317ZdescriptionThe organization identifies critical information system components and functions by performing a criticality analysis for [Assignment: organization-defined information systems, information system components, or information system services] at [Assignment: organization-defined decision points in the system development life cycle]. Criticality analysis is a key tenet of supply chain risk management and informs the prioritization of supply chain protection activities such as attack surface reduction, use of all-source intelligence, and tailored acquisition strategies. Information system engineers can conduct an end-to-end functional decomposition of an information system to identify mission-critical functions and components. The functional decomposition includes the identification of core organizational missions supported by the system, decomposition into the specific functions to perform those missions, and traceability to the hardware, software, and firmware components that implement those functions, including when the functions are shared by many components within and beyond the information system boundary. Information system components that allow for unmediated access to critical components or functions are considered critical due to the inherent vulnerabilities such components create. Criticality is assessed in terms of the impact of the function or component failure on the ability of the component to complete the organizational missions supported by the information system. A criticality analysis is performed whenever an architecture or design is being developed or modified, including upgrades.external_references idcourse-of-action--5aebfabc-a2a1-486c-9a04-ce19bd40dea4modified2022-01-26T16:18:10.317ZnameCriticality Analysistypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP0 external_idSA-14source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.318ZdescriptionThe organization requires that developers perform threat modeling and a vulnerability analysis for the information system at [Assignment: organization-defined breadth/depth] that: *SA-15 (4)(a)Uses [Assignment: organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels]; *SA-15 (4)(b)Employs [Assignment: organization-defined tools and methods]; and *SA-15 (4)(c)Produces evidence that meets [Assignment: organization-defined acceptance criteria].external_references idcourse-of-action--e9f8ffd1-2f79-448d-9e7d-6ce2c912a4f1modified2022-01-26T16:18:10.318ZnameThreat Modeling / Vulnerability Analysistypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP2 external_idSA-15 (4)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.319ZdescriptionThe organization approves, documents, and controls the use of live data in development and test environments for the information system, system component, or information system service. The use of live data in preproduction environments can result in significant risk to organizations. Organizations can minimize such risk by using test or dummy data during the development and testing of information systems, information system components, and information system services.external_references idcourse-of-action--980ba873-8e76-41ac-9e9e-0714a38805b1modified2022-01-26T16:18:10.319ZnameUse Of Live Datatypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP2 external_idSA-15 (9)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.320ZdescriptionThe organization requires the developer of the information system, system component, or information system service to: *SA-17 (2)(a)Define security-relevant hardware, software, and firmware; and *SA-17 (2)(b)Provide a rationale that the definition for security-relevant hardware, software, and firmware is complete. Security-relevant hardware, software, and firmware represent the portion of the information system, component, or service that must be trusted to perform correctly in order to maintain required security properties.external_references idcourse-of-action--76169db4-6169-465e-b800-c81ac2409663modified2022-01-26T16:18:10.320ZnameSecurity-Relevant Componentstypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_impact x_mitre_priorityP1 external_idSA-17 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.321ZdescriptionThe organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.external_references idcourse-of-action--47161905-c701-481f-9cb1-f7cdd7d0f4f2modified2022-01-26T16:18:10.321ZnameStructure For Least Privilegetypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP1 external_idSA-17 (7)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.322ZdescriptionThe organization maintains configuration control over [Assignment: organization-defined information system components] awaiting service/repair and serviced/repaired components awaiting return to service.external_references idcourse-of-action--c7a5004a-f696-4997-826b-7b8c84c84144modified2022-01-26T16:18:10.322ZnameConfiguration Control For Component Service / Repairtypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP0 external_idSA-19 (2)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.323ZdescriptionThe organization requires the developer of the information system, system component, or information system service take [Assignment: organization-defined actions] to ensure that the required access authorizations and screening criteria are satisfied. Satisfying required access authorizations and personnel screening criteria includes, for example, providing a listing of all the individuals authorized to perform development activities on the selected information system, system component, or information system service so that organizations can validate that the developer has satisfied the necessary authorization and screening requirements.external_references idcourse-of-action--bab1e4dd-2fdb-464b-a37b-c054bf422e33modified2022-01-26T16:18:10.323ZnameValidation Of Screeningtypecourse-of-actionx_mitre_familySystem And Services Acquisitionx_mitre_priorityP0 external_idSA-21 (1)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.324ZdescriptionThe information system isolates security functions from nonsecurity functions. The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains). Such isolation controls access to and protects the integrity of the hardware, software, and firmware that perform those security functions. Information systems implement code separation (i.e., separation of security functions from nonsecurity functions) in a number of ways, including, for example, through the provision of security kernels via processor rings or processor modes. For non-kernel code, security function isolation is often achieved through file system protections that serve to protect the code on disk, and address space protections that protect executing code. Information systems restrict access to security functions through the use of access control mechanisms and by implementing least privilege capabilities. While the ideal is for all of the code within the security function isolation boundary to only contain security-relevant code, it is sometimes necessary to include nonsecurity functions within the isolation boundary as an exception.external_references idcourse-of-action--a81b990f-2787-4d13-a488-fbac1d4386c9modified2022-01-26T16:18:10.324ZnameSecurity Function Isolationtypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-3source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.325ZdescriptionThe organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers. The implementation of layered structures with minimized interactions among security functions and non-looping layers (i.e., lower-layer functions do not depend on higher-layer functions) further enables the isolation of security functions and management of complexity.external_references idcourse-of-action--8dbc9dcd-8173-4c5a-901f-1cb16b2c5df7modified2022-01-26T16:18:10.325ZnameLayered Structurestypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP1 external_idSC-3 (5)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.326ZdescriptionThe information system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding denial of service attacks. Managing excess capacity ensures that sufficient capacity is available to counter flooding attacks. Managing excess capacity may include, for example, establishing selected usage priorities, quotas, or partitioning.external_references idcourse-of-action--bd62fcfd-d3eb-462b-a4ba-2e7f86081b75modified2022-01-26T16:18:10.326ZnameExcess Capacity / Bandwidth / Redundancytypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-5 (2)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.327Zdescription[Withdrawn: Incorporated into SC-7].external_references idcourse-of-action--a297d869-4c50-4375-9fbd-11a7fd8820fcmodified2022-01-26T16:18:10.327ZnamePublic Accesstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-7 (2)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.328ZdescriptionThe information system routes [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces. External networks are networks outside of organizational control. A proxy server is a server (i.e., information system or application) that acts as an intermediary for clients requesting information system resources (e.g., files, connections, web pages, or services) from other organizational servers. Client requests established through an initial connection to the proxy server are evaluated to manage complexity and to provide additional protection by limiting direct connectivity. Web content filtering devices are one of the most common proxy servers providing access to the Internet. Proxy servers support logging individual Transmission Control Protocol (TCP) sessions and blocking specific Uniform Resource Locators (URLs), domain names, and Internet Protocol (IP) addresses. Web proxies can be configured with organization-defined lists of authorized and unauthorized websites.external_references idcourse-of-action--3ba9de17-7a93-46da-bd88-3baa56070dc2modified2022-01-26T16:18:10.328ZnameRoute Traffic To Authenticated Proxy Serverstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-7 (8)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.329ZdescriptionThe organization isolates [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal information system components by implementing physically separate subnetworks with managed interfaces to other components of the system. Physically separate subnetworks with managed interfaces are useful, for example, in isolating computer network defenses from critical operational processing networks to prevent adversaries from discovering the analysis and forensics techniques of organizations.external_references idcourse-of-action--cca9c855-e3ee-4652-b63d-83f57e657341modified2022-01-26T16:18:10.329ZnameIsolation Of Security Tools / Mechanisms / Support Componentstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP1 external_idSC-7 (13)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.330ZdescriptionThe information system blocks both inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers. Communication clients independently configured by end users and external service providers include, for example, instant messaging clients. Traffic blocking does not apply to communication clients that are configured by organizations to perform authorized functions.external_references idcourse-of-action--f06b1dd1-bbf0-4918-a9fb-8db9191cae6cmodified2022-01-26T16:18:10.330ZnameBlocks Communication From Non-Organizationally Configured Hoststypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-7 (19)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.331ZdescriptionThe information system protects the [Selection (one or more): confidentiality; integrity] of transmitted information. This control applies to both internal and external networks and all types of information system components from which information can be transmitted (e.g., servers, mobile devices, notebook computers, printers, copiers, scanners, facsimile machines). Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and/or integrity of organizational information can be accomplished by physical means (e.g., by employing protected distribution systems) or by logical means (e.g., employing encryption techniques). Organizations relying on commercial providers offering transmission services as commodity services rather than as fully dedicated services (i.e., services which can be highly specialized to individual customer needs), may find it difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality/integrity. In such situations, organizations determine what types of confidentiality/integrity services are available in standard, commercial telecommunication service packages. If it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, organizations implement appropriate compensating security controls or explicitly accept the additional risk.external_references idcourse-of-action--cf53299c-d329-49f7-a425-e282fe6bb000modified2022-01-26T16:18:10.331ZnameTransmission Confidentiality And Integritytypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-8source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.332Zdescription[Withdrawn: Incorporated into SC-8].external_references idcourse-of-action--e93884aa-e431-450b-9924-e0f9c3d10730modified2022-01-26T16:18:10.332ZnameTransmission Confidentialitytypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-9source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.333ZdescriptionThe organization maintains availability of information in the event of the loss of cryptographic keys by users. Escrowing of encryption keys is a common practice for ensuring availability in the event of loss of keys (e.g., due to forgotten passphrase).external_references idcourse-of-action--80ddf7df-83f9-4905-b4c4-617a13d72da2modified2022-01-26T16:18:10.333ZnameAvailabilitytypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-12 (1)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.334ZdescriptionThe information system implements [Assignment: organization-defined cryptographic uses and type of cryptography required for each use] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).external_references idcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785modified2022-01-26T16:18:10.334ZnameCryptographic Protectiontypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-13source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.335ZdescriptionThe information system: *SC-15a.Prohibits remote activation of collaborative computing devices with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]; and *SC-15b.Provides an explicit indication of use to users physically present at the devices. Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.external_references idcourse-of-action--90372cb6-fa24-4c3e-9612-12418db671eemodified2022-01-26T16:18:10.335ZnameCollaborative Computing Devicestypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-15source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.336ZdescriptionThe information system associates [Assignment: organization-defined security attributes] with information exchanged between information systems and between system components. Security attributes can be explicitly or implicitly associated with the information contained in organizational information systems or system components.external_references idcourse-of-action--1ec61bb4-9800-43e0-a29c-0f1ec20e8827modified2022-01-26T16:18:10.336ZnameTransmission Of Security Attributestypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-16source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.337ZdescriptionThe organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets [Assignment: organization-defined mobile code requirements].external_references idcourse-of-action--e9147ee3-29a5-476e-9d3d-de9502c999fcmodified2022-01-26T16:18:10.337ZnameAcquisition / Development / Usetypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP2 external_idSC-18 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.338ZdescriptionThe information system: *SC-20a.Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and *SC-20b.Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace. This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host/service names and network addresses provide other means to assure the authenticity and integrity of response data.external_references idcourse-of-action--6b4f930b-642e-46a3-ba5f-ae54ea544703modified2022-01-26T16:18:10.338ZnameSecure Name / Address Resolution Service (Authoritative Source)typecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-20source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.339ZdescriptionThe information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).external_references idcourse-of-action--2bc46d02-f2ca-4634-bd3d-c3929a971f86modified2022-01-26T16:18:10.339ZnameArchitecture And Provisioning For Name / Address Resolution Servicetypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-22source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.340Zdescription[Withdrawn: Incorporated into SC-23 (3)].external_references idcourse-of-action--5fa6cb3b-412e-44a5-9057-b64b0a86868emodified2022-01-26T16:18:10.340ZnameUnique Session Identifiers With Randomizationtypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP1 external_idSC-23 (4)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.341Zdescription[Withdrawn: Incorporated into SC-35].external_references idcourse-of-action--6cac0cfb-86c1-4e4a-bceb-11efb0c5f0b1modified2022-01-26T16:18:10.341ZnameDetection Of Malicious Codetypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP0 external_idSC-26 (1)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.342ZdescriptionThe organization employs a diverse set of information technologies for [Assignment: organization-defined information system components] in the implementation of the information system. Increasing the diversity of information technologies within organizational information systems reduces the impact of potential exploitations of specific technologies and also defends against common mode failures, including those failures induced by supply chain attacks. Diversity in information technologies also reduces the likelihood that the means adversaries use to compromise one information system component will be equally effective against other system components, thus further increasing the adversary work factor to successfully complete planned cyber attacks. An increase in diversity may add complexity and management overhead which could ultimately lead to mistakes and unauthorized configurations.external_references idcourse-of-action--e0b3a349-1dcf-43db-939f-ab14550d6207modified2022-01-26T16:18:10.342ZnameHeterogeneitytypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP0 external_idSC-29source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.343ZdescriptionThe organization changes the location of [Assignment: organization-defined processing and/or storage] [Selection: [Assignment: organization-defined time frequency]; at random time intervals]]. Adversaries target critical organizational missions/business functions and the information resources supporting those missions and functions while at the same time, trying to minimize exposure of their existence and tradecraft. The static, homogeneous, and deterministic nature of organizational information systems targeted by adversaries, make such systems more susceptible to cyber attacks with less adversary cost and effort to be successful. Changing organizational processing and storage locations (sometimes referred to as moving target defense) addresses the advanced persistent threat (APT) using techniques such as virtualization, distributed processing, and replication. This enables organizations to relocate the information resources (i.e., processing and/or storage) supporting critical missions and business functions. Changing locations of processing activities and/or storage sites introduces uncertainty into the targeting activities by adversaries. This uncertainty increases the work factor of adversaries making compromises or breaches to organizational information systems much more difficult and time-consuming, and increases the chances that adversaries may inadvertently disclose aspects of tradecraft while attempting to locate critical organizational resources.external_references idcourse-of-action--4d815725-eda4-4842-a8fe-518c2c4ff088modified2022-01-26T16:18:10.343ZnameChange Processing / Storage Locationstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-30 (3)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.344ZdescriptionThe organization reduces the maximum bandwidth for identified covert [Selection (one or more); storage; timing] channels to [Assignment: organization-defined values]. Information system developers are in the best position to reduce the maximum bandwidth for identified covert storage and timing channels.external_references idcourse-of-action--f3f3eb84-4b1f-428f-b03b-3998627e9511modified2022-01-26T16:18:10.344ZnameMaximum Bandwidthtypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-31 (2)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.345ZdescriptionThe information system at [Assignment: organization-defined information system components]: *SC-34a.Loads and executes the operating environment from hardware-enforced, read-only media; and *SC-34b.Loads and executes [Assignment: organization-defined applications] from hardware-enforced, read-only media. The term operating environment is defined as the specific code that hosts applications, for example, operating systems, executives, or monitors including virtual machine monitors (i.e., hypervisors). It can also include certain applications running directly on hardware platforms. Hardware-enforced, read-only media include, for example, Compact Disk-Recordable (CD-R)/Digital Video Disk-Recordable (DVD-R) disk drives and one-time programmable read-only memory. The use of non-modifiable storage ensures the integrity of software from the point of creation of the read-only image. The use of reprogrammable read-only memory can be accepted as read-only media provided: (i) integrity can be adequately protected from the point of initial writing to the insertion of the memory into the information system; and (ii) there are reliable hardware protections against reprogramming the memory while installed in organizational information systems.external_references idcourse-of-action--d2281ff9-3dc5-47c4-85dc-cd8b019dd211modified2022-01-26T16:18:10.345ZnameNon-Modifiable Executable Programstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-34source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.346ZdescriptionThe organization distributes [Assignment: organization-defined processing and storage] across multiple physical locations. Distributing processing and storage across multiple physical locations provides some degree of redundancy or overlap for organizations, and therefore increases the work factor of adversaries to adversely impact organizational operations, assets, and individuals. This control does not assume a single primary processing or storage location, and thus allows for parallel processing and storage.external_references idcourse-of-action--500e2f8a-e148-422c-92ad-e0aa81795132modified2022-01-26T16:18:10.346ZnameDistributed Processing And Storagetypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-36source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.347ZdescriptionThe organization employs [Assignment: organization-defined operations security safeguards] to protect key organizational information throughout the system development life cycle. Operations security (OPSEC) is a systematic process by which potential adversaries can be denied information about the capabilities and intentions of organizations by identifying, controlling, and protecting generally unclassified information that specifically relates to the planning and execution of sensitive organizational activities. The OPSEC process involves five steps: (i) identification of critical information (e.g., the security categorization process); (ii) analysis of threats; (iii) analysis of vulnerabilities; (iv) assessment of risks; and (v) the application of appropriate countermeasures. OPSEC safeguards are applied to both organizational information systems and the environments in which those systems operate. OPSEC safeguards help to protect the confidentiality of key information including, for example, limiting the sharing of information with suppliers and potential suppliers of information system components, information technology products and services, and with other non-organizational elements and individuals. Information critical to mission/business success includes, for example, user identities, element uses, suppliers, supply chain processes, functional and security requirements, system design specifications, testing protocols, and security control implementation details.external_references idcourse-of-action--9721ab49-1a6b-456d-8917-c281e44e6b92modified2022-01-26T16:18:10.347ZnameOperations Securitytypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-38source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.348ZdescriptionThe information system implements cryptographic mechanisms that achieve [Assignment: organization-defined level of protection] against the effects of intentional electromagnetic interference. This control enhancement protects against intentional jamming that might deny or impair communications by ensuring that wireless spread spectrum waveforms used to provide anti-jam protection are not predictable by unauthorized individuals. The control enhancement may also coincidentally help to mitigate the effects of unintentional jamming due to interference from legitimate transmitters sharing the same spectrum. Mission requirements, projected threats, concept of operations, and applicable legislation, directives, regulations, policies, standards, and guidelines determine levels of wireless link availability and performance/cryptography needed.external_references idcourse-of-action--e939e84a-c8df-4fb2-9c51-817c93da50f3modified2022-01-26T16:18:10.348ZnameElectromagnetic Interferencetypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_impact x_mitre_priorityP0 external_idSC-40 (1)source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.349ZdescriptionThe organization physically disables or removes [Assignment: organization-defined connection ports or input/output devices] on [Assignment: organization-defined information systems or information system components]. Connection ports include, for example, Universal Serial Bus (USB) and Firewire (IEEE 1394). Input/output (I/O) devices include, for example, Compact Disk (CD) and Digital Video Disk (DVD) drives. Physically disabling or removing such connection ports and I/O devices helps prevent exfiltration of information from information systems and the introduction of malicious code into systems from those ports/devices.external_references idcourse-of-action--ec048708-4050-4956-81ac-b67ba7cc4c7amodified2022-01-26T16:18:10.349ZnamePort And I/O Device Accesstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-41source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.350ZdescriptionThe organization: *SC-43a.Establishes usage restrictions and implementation guidance for [Assignment: organization-defined information system components] based on the potential to cause damage to the information system if used maliciously; and *SC-43b.Authorizes, monitors, and controls the use of such components within the information system. Information system components include hardware, software, or firmware components (e.g., Voice Over Internet Protocol, mobile code, digital copiers, printers, scanners, optical devices, wireless technologies, mobile devices).external_references idcourse-of-action--8dce3b4a-2851-470d-a1a6-35d5fa9cec90modified2022-01-26T16:18:10.350ZnameUsage Restrictionstypecourse-of-actionx_mitre_familySystem And Communications Protectionx_mitre_priorityP0 external_idSC-43source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.351ZdescriptionThe organization centrally manages the flaw remediation process. Central management is the organization-wide management and implementation of flaw remediation processes. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw remediation security controls.external_references idcourse-of-action--1687e411-92d2-4ae9-81c5-cbd0d7a0fd9dmodified2022-01-26T16:18:10.351ZnameCentral Managementtypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-2 (1)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.352ZdescriptionThe organization installs [Assignment: organization-defined security-relevant software and firmware updates] automatically to [Assignment: organization-defined information system components]. Due to information system integrity and availability concerns, organizations give careful consideration to the methodology used to carry out automatic updates. Organizations must balance the need to ensure that the updates are installed as soon as possible with the need to maintain configuration management and with any mission or operational impacts that automatic updates might impose.external_references idcourse-of-action--48de6682-9328-48b3-8c44-20d6984d2746modified2022-01-26T16:18:10.352ZnameAutomatic Software / Firmware Updatestypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-2 (5)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.353Zdescription[Withdrawn: Incorporated into AC-6 (10)].external_references idcourse-of-action--6fd25a62-6a88-4d1c-aa50-2da143cdb73amodified2022-01-26T16:18:10.353ZnameNon-Privileged Userstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-3 (3)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.354ZdescriptionThe information system detects [Assignment: organization-defined unauthorized operating system commands] through the kernel application programming interface at [Assignment: organization-defined information system hardware components] and [Selection (one or more): issues a warning; audits the command execution; prevents the execution of the command]. This control enhancement can also be applied to critical interfaces other than kernel-based interfaces, including for example, interfaces with virtual machines and privileged applications. Unauthorized operating system commands include, for example, commands for kernel functions from information system processes that are not trusted to initiate such commands, or commands for kernel functions that are suspicious even though commands of that type are reasonable for processes to initiate. Organizations can define the malicious commands to be detected by a combination of command types, command classes, or specific instances of commands. Organizations can define hardware components by specific component, component type, location in the network, or combination therein. Organizations may select different actions for different types/classes/specific instances of potentially malicious commands.external_references idcourse-of-action--95c834de-60ab-46ea-9941-795fbe6b4dc4modified2022-01-26T16:18:10.354ZnameDetect Unauthorized Commandstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_priorityP1 external_idSI-3 (8)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.355ZdescriptionThe organization employs automated tools to support near real-time analysis of events. Automated tools include, for example, host-based, network-based, transport-based, or storage-based event monitoring tools or Security Information and Event Management (SIEM) technologies that provide real time analysis of alerts and/or notifications generated by organizational information systems.external_references idcourse-of-action--7090b598-dd18-43ea-93dc-78bfdf16c39fmodified2022-01-26T16:18:10.355ZnameAutomated Tools For Real-Time Analysistypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-4 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.356ZdescriptionThe information system notifies [Assignment: organization-defined incident response personnel (identified by name and/or by role)] of detected suspicious events and takes [Assignment: organization-defined least-disruptive actions to terminate suspicious events]. Least-disruptive actions may include, for example, initiating requests for human responses.external_references idcourse-of-action--973c2400-23f9-4907-9ef6-8de8deffd9c3modified2022-01-26T16:18:10.356ZnameAutomated Response To Suspicious Eventstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-4 (7)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.357ZdescriptionThe organization: *SI-4 (13)(a)Analyzes communications traffic/event patterns for the information system; *SI-4 (13)(b)Develops profiles representing common traffic patterns and/or events; and *SI-4 (13)(c)Uses the traffic/event profiles in tuning system-monitoring devices to reduce the number of false positives and the number of false negatives.external_references idcourse-of-action--4a112848-e39d-44d1-b44e-1598f52a65dbmodified2022-01-26T16:18:10.357ZnameAnalyze Traffic / Event Patternstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_priorityP1 external_idSI-4 (13)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.358ZdescriptionThe organization correlates information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness. This control enhancement correlates monitoring information from a more diverse set of information sources to achieve integrated situational awareness. Integrated situational awareness from a combination of physical, cyber, and supply chain monitoring activities enhances the capability of organizations to more quickly detect sophisticated cyber attacks and investigate the methods and techniques employed to carry out such attacks. In contrast to SI-4 (16) which correlates the various cyber monitoring information, this control enhancement correlates monitoring beyond just the cyber domain. Such monitoring may help reveal attacks on organizations that are operating across multiple attack vectors.external_references idcourse-of-action--4f55281e-dcb9-4e94-bdb9-cffb4c075cd4modified2022-01-26T16:18:10.358ZnameIntegrated Situational Awarenesstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_priorityP1 external_idSI-4 (17)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.359ZdescriptionThe organization implements [Assignment: organization-defined host-based monitoring mechanisms] at [Assignment: organization-defined information system components]. Information system components where host-based monitoring can be implemented include, for example, servers, workstations, and mobile devices. Organizations consider employing host-based monitoring mechanisms from multiple information technology product developers.external_references idcourse-of-action--f9e12cb6-4259-4f1c-8904-bfecf749d363modified2022-01-26T16:18:10.359ZnameHost-Based Devicestypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_priorityP1 external_idSI-4 (23)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.360Zdescription[Withdrawn: Incorporated into SI-6].external_references idcourse-of-action--c6377d8a-5936-41d7-92e8-ec5519867878modified2022-01-26T16:18:10.360ZnameNotification Of Failed Security Teststypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-6 (1)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.361ZdescriptionThe organization employs automated tools that provide notification to [Assignment: organization-defined personnel or roles] upon discovering discrepancies during integrity verification. The use of automated tools to report integrity violations and to notify organizational personnel in a timely matter is an essential precursor to effective risk response. Personnel having an interest in integrity violations include, for example, mission/business owners, information system owners, systems administrators, software developers, systems integrators, and information security officers.external_references idcourse-of-action--bf1485d9-6578-40ef-b611-cf050f17b817modified2022-01-26T16:18:10.361ZnameAutomated Notifications Of Integrity Violationstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-7 (2)source_nameNIST 800-53 Revision 4HIGHcreated2022-01-26T16:18:10.362ZdescriptionThe organization incorporates the detection of unauthorized [Assignment: organization-defined security-relevant changes to the information system] into the organizational incident response capability. This control enhancement helps to ensure that detected events are tracked, monitored, corrected, and available for historical purposes. Maintaining historical records is important both for being able to identify and discern adversary actions over an extended period of time and for possible legal actions. Security-relevant changes include, for example, unauthorized changes to established configuration settings or unauthorized elevation of information system privileges.external_references idcourse-of-action--92cda502-0461-45bc-947d-cf8dd870357fmodified2022-01-26T16:18:10.362ZnameIntegration Of Detection And Responsetypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-7 (7)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.363ZdescriptionThe organization allows execution of binary or machine-executable code obtained from sources with limited or no warranty and without the provision of source code only in confined physical or virtual machine environments and with the explicit approval of [Assignment: organization-defined personnel or roles]. This control enhancement applies to all sources of binary or machine-executable code including, for example, commercial software/firmware and open source software.external_references idcourse-of-action--b6ffa5f9-5be4-481a-a3a7-d961b9702ca4modified2022-01-26T16:18:10.363ZnameCode Execution In Protected Environmentstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_priorityP1 external_idSI-7 (13)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.364ZdescriptionThe information system automatically updates spam protection mechanisms.external_references idcourse-of-action--734af040-6d4b-465f-9ecd-e74cd95849a9modified2022-01-26T16:18:10.364ZnameAutomatic Updatestypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP2 external_idSI-8 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.365ZdescriptionThe organization ensures that input validation errors are reviewed and resolved within [Assignment: organization-defined time period]. Resolution of input validation errors includes, for example, correcting systemic causes of errors and resubmitting transactions with corrected input.external_references idcourse-of-action--a268ed72-5bf6-4b77-a144-3056052232ffmodified2022-01-26T16:18:10.365ZnameReview / Resolution Of Errorstypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP1 external_idSI-10 (2)source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.366ZdescriptionThe organization: *SI-13a.Determines mean time to failure (MTTF) for [Assignment: organization-defined information system components] in specific environments of operation; and *SI-13b.Provides substitute information system components and a means to exchange active and standby components at [Assignment: organization-defined MTTF substitution criteria]. While MTTF is primarily a reliability issue, this control addresses potential failures of specific information system components that provide security capability. Failure rates reflect installation-specific consideration, not industry-average. Organizations define criteria for substitution of information system components based on MTTF value with consideration for resulting potential harm from component failures. Transfer of responsibilities between active and standby components does not compromise safety, operational readiness, or security capability (e.g., preservation of state variables). Standby components remain available at all times except for maintenance issues or recovery failures in progress.external_references idcourse-of-action--525a3c24-5f2e-40d5-868f-d21e58098ccbmodified2022-01-26T16:18:10.366ZnamePredictable Failure Preventiontypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP0 external_idSI-13source_nameNIST 800-53 Revision 4LOWMODERATEHIGHcreated2022-01-26T16:18:10.367ZdescriptionThe organization provides [Selection: real-time; near real-time] [Assignment: organization-defined failover capability] for the information system. Failover refers to the automatic switchover to an alternate information system upon the failure of the primary information system. Failover capability includes, for example, incorporating mirrored information system operations at alternate processing sites or periodic data mirroring at regular intervals defined by recovery time periods of organizations.external_references idcourse-of-action--08aee67d-130e-40eb-9b4c-432e68fdc946modified2022-01-26T16:18:10.367ZnameFailover Capabilitytypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_priorityP0 external_idSI-13 (5)source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.368ZdescriptionThe information system implements [Assignment: organization-defined fail-safe procedures] when [Assignment: organization-defined failure conditions occur]. Failure conditions include, for example, loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include, for example, alerting operator personnel and providing specific instructions on subsequent steps to take (e.g., do nothing, reestablish system settings, shut down processes, restart the system, or contact designated organizational personnel).external_references idcourse-of-action--0fda39eb-eb08-4c8e-9080-e8cd0628245cmodified2022-01-26T16:18:10.368ZnameFail-Safe Procedurestypecourse-of-actionx_mitre_familySystem And Information Integrityx_mitre_impact x_mitre_priorityP0 external_idSI-17source_nameNIST 800-53 Revision 4MODERATEHIGHcreated2022-01-26T16:18:10.369ZdescriptionThe organization develops, monitors, and reports on the results of information security measures of performance. Measures of performance are outcome-based metrics used by an organization to measure the effectiveness or efficiency of the information security program and the security controls employed in support of the program.external_references idcourse-of-action--99fb947f-a9b4-42bf-9560-25ebe21ba9b9modified2022-01-26T16:18:10.369ZnameInformation Security Measures Of Performancetypecourse-of-actionx_mitre_familyProgram Management external_idPM-6source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.370ZdescriptionThe organization implements an insider threat program that includes a cross-discipline insider threat incident handling team. Organizations handling classified information are required, under Executive Order 13587 and the National Policy on Insider Threat, to establish insider threat programs. The standards and guidelines that apply to insider threat programs in classified environments can also be employed effectively to improve the security of Controlled Unclassified Information in non-national security systems. Insider threat programs include security controls to detect and prevent malicious insider activity through the centralized integration and analysis of both technical and non-technical information to identify potential insider threat concerns. A senior organizational official is designated by the department/agency head as the responsible individual to implement and provide oversight for the program. In addition to the centralized integration and analysis capability, insider threat programs as a minimum, prepare department/agency insider threat policies and implementation plans, conduct host-based user monitoring of individual employee activities on government-owned classified computers, provide insider threat awareness training to employees, receive access to information from all offices within the department/agency (e.g., human resources, legal, physical security, personnel security, information technology, information system security, and law enforcement) for insider threat analysis, and conduct self-assessments of department/agency insider threat posture. Insider threat programs can leverage the existence of incident handling teams organizations may already have in place, such as computer security incident response teams. Human resources records are especially important in this effort, as there is compelling evidence to show that some types of insider crimes are often preceded by nontechnical behaviors in the workplace (e.g., ongoing patterns of disgruntled behavior and conflicts with coworkers and other colleagues). These precursors can better inform and guide organizational officials in more focused, targeted monitoring efforts. The participation of a legal team is important to ensure that all monitoring activities are performed in accordance with appropriate legislation, directives, regulations, policies, standards, and guidelines.external_references idcourse-of-action--e48d90a4-d33d-40ab-a2d7-f06bd8fca9dfmodified2022-01-26T16:18:10.370ZnameInsider Threat Programtypecourse-of-actionx_mitre_familyProgram Management external_idPM-12source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.371ZdescriptionThe organization implements a threat awareness program that includes a cross-organization information-sharing capability. Because of the constantly changing and increasing sophistication of adversaries, especially the advanced persistent threat (APT), it is becoming more likely that adversaries may successfully breach or compromise organizational information systems. One of the best techniques to address this concern is for organizations to share threat information. This can include, for example, sharing threat events (i.e., tactics, techniques, and procedures) that organizations have experienced, mitigations that organizations have found are effective against certain types of threats, threat intelligence (i.e., indications and warnings about threats that are likely to occur). Threat information sharing may be bilateral (e.g., government-commercial cooperatives, government-government cooperatives), or multilateral (e.g., organizations taking part in threat-sharing consortia). Threat information may be highly sensitive requiring special agreements and protection, or less sensitive and freely shared.external_references idcourse-of-action--99a68447-6410-48ca-b475-855151f85317modified2022-01-26T16:18:10.371ZnameThreat Awareness Programtypecourse-of-actionx_mitre_familyProgram Management external_idPM-16source_nameNIST 800-53 Revision 4created2022-01-26T16:18:10.372Zidrelationship--e8b0a627-0d9a-498e-b46c-660850ec7032modified2022-01-26T16:18:10.372Zrelationship_typerelated-tosource_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atarget_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.373Zidrelationship--c1ae8fd6-e381-4bdf-ac7f-2a8f7eebfc35modified2022-01-26T16:18:10.373Zrelationship_typerelated-tosource_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atarget_refcourse-of-action--80cf81f5-9bf9-47a5-96f2-3b57a9251510typerelationshipcreated2022-01-26T16:18:10.374Zidrelationship--02804f5e-b3bb-4b01-91aa-6625270a9cfcmodified2022-01-26T16:18:10.374Zrelationship_typerelated-tosource_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atarget_refcourse-of-action--b0063eb6-8ca6-49ce-a305-3a435c16e937typerelationshipcreated2022-01-26T16:18:10.375Zidrelationship--c65220a1-e1cf-402a-8399-a4be4ecd1b85modified2022-01-26T16:18:10.375Zrelationship_typesubcontrol-ofsource_refcourse-of-action--23cf5366-b642-46c1-b379-cf74fc3c206ftarget_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atyperelationshipcreated2022-01-26T16:18:10.376Zidrelationship--22c25942-2c7c-4bac-8b18-a702362c5db4modified2022-01-26T16:18:10.376Zrelationship_typerelated-tosource_refcourse-of-action--2c69e5d1-56b1-4e7a-bc90-5210f18ba342target_refcourse-of-action--7ac273cd-7e0f-4ccc-9ad0-85d184c0b129typerelationshipcreated2022-01-26T16:18:10.377Zidrelationship--f28c2869-50b2-473b-9d49-f8e3d1065500modified2022-01-26T16:18:10.377Zrelationship_typesubcontrol-ofsource_refcourse-of-action--089e0a59-cfd4-481f-9a12-20cc2cc3f02atarget_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atyperelationshipcreated2022-01-26T16:18:10.378Zidrelationship--42c500bc-87ea-4fed-a2ab-3832c823895bmodified2022-01-26T16:18:10.378Zrelationship_typerelated-tosource_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4target_refcourse-of-action--23ed1a0b-6ea8-4bc0-a952-675c16fbcfcctyperelationshipcreated2022-01-26T16:18:10.379Zidrelationship--8cbda2a3-afdb-489a-a3e1-2ffe5906e7c9modified2022-01-26T16:18:10.379Zrelationship_typerelated-tosource_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4target_refcourse-of-action--32c6ca50-0659-4880-bf51-7ec778c3adebtyperelationshipcreated2022-01-26T16:18:10.380Zidrelationship--5b5eda1d-a0d3-4ab8-8a27-ab6b58b70f5cmodified2022-01-26T16:18:10.380Zrelationship_typerelated-tosource_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4target_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btyperelationshipcreated2022-01-26T16:18:10.381Zidrelationship--eef2d582-8c66-4d5a-b9c0-69f57133e670modified2022-01-26T16:18:10.381Zrelationship_typerelated-tosource_refcourse-of-action--6cb5ef70-74e9-469a-9c06-5ca00b5f3b5btarget_refcourse-of-action--265141ac-f03a-4946-b34c-8de47acfcf4dtyperelationshipcreated2022-01-26T16:18:10.382Zidrelationship--05bc6d4c-676a-4100-bbf4-3dd100ad1479modified2022-01-26T16:18:10.382Zrelationship_typesubcontrol-ofsource_refcourse-of-action--79284ef7-9828-4e4f-84a8-5b40223551aftarget_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4typerelationshipcreated2022-01-26T16:18:10.383Zidrelationship--19e754a1-f1cb-4a2e-b66e-45b640ccdc9amodified2022-01-26T16:18:10.383Zrelationship_typerelated-tosource_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057target_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.384Zidrelationship--bab77a0e-a7fb-4df1-bcd5-808f46b8001cmodified2022-01-26T16:18:10.384Zrelationship_typerelated-tosource_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.385Zidrelationship--5270e8a5-3de4-4a0f-909a-dcea8e161d49modified2022-01-26T16:18:10.385Zrelationship_typerelated-tosource_refcourse-of-action--42bcc321-0c9c-4094-b0cf-e3bd1ed75ce9target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.386Zidrelationship--3b66db92-02c0-4fd0-87c9-b3fc5a637278modified2022-01-26T16:18:10.386Zrelationship_typesubcontrol-ofsource_refcourse-of-action--05c024c5-f94b-4219-88c0-81fef24041aatarget_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.387Zidrelationship--5f5ce387-758e-43d3-a52e-c60f166c2e2cmodified2022-01-26T16:18:10.387Zrelationship_typesubcontrol-ofsource_refcourse-of-action--adc386ba-3d6a-4409-bf9d-660419dffe8atarget_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.388Zidrelationship--aeb1b414-0449-4aed-91e3-3d3bba764ee5modified2022-01-26T16:18:10.388Zrelationship_typerelated-tosource_refcourse-of-action--77256107-f46d-46c0-bd9c-e016d238cb86target_refcourse-of-action--80cf81f5-9bf9-47a5-96f2-3b57a9251510typerelationshipcreated2022-01-26T16:18:10.389Zidrelationship--d658afe0-8b31-493c-9ff6-3cc830f6e181modified2022-01-26T16:18:10.389Zrelationship_typesubcontrol-ofsource_refcourse-of-action--84b1a714-8025-40c9-9ddb-e1b8a896c876target_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.390Zidrelationship--d06a1f2f-ec98-4852-a436-fc14572e9ee0modified2022-01-26T16:18:10.390Zrelationship_typerelated-tosource_refcourse-of-action--dc0a01d1-aca8-486d-b15f-f66e9f929227target_refcourse-of-action--8d5aac02-c088-4c97-959b-ef8e06c9f52btyperelationshipcreated2022-01-26T16:18:10.391Zidrelationship--d5837a30-2670-47cb-a800-a4687a296f71modified2022-01-26T16:18:10.391Zrelationship_typesubcontrol-ofsource_refcourse-of-action--be65cb08-f40e-45e9-a39b-9c16dedf36d0target_refcourse-of-action--23ed1a0b-6ea8-4bc0-a952-675c16fbcfcctyperelationshipcreated2022-01-26T16:18:10.392Zidrelationship--e6e298b0-4c85-4efc-96b7-3d96ddc9101dmodified2022-01-26T16:18:10.392Zrelationship_typerelated-tosource_refcourse-of-action--2641e2b7-262b-44c9-b674-b08f8122fa2btarget_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2typerelationshipcreated2022-01-26T16:18:10.393Zidrelationship--31c72886-ead5-4ebf-b071-39fd4ed91146modified2022-01-26T16:18:10.393Zrelationship_typerelated-tosource_refcourse-of-action--cdd83a9a-de97-4e6a-bd6d-cdb6cde2e98dtarget_refcourse-of-action--f5dbe28d-4d5a-4318-b876-d084c60500d6typerelationshipcreated2022-01-26T16:18:10.394Zidrelationship--2a3cb16d-5041-4de8-9642-2cb566794885modified2022-01-26T16:18:10.394Zrelationship_typesubcontrol-ofsource_refcourse-of-action--84820e01-8f5b-448d-9d6d-65d107be7943target_refcourse-of-action--23ed1a0b-6ea8-4bc0-a952-675c16fbcfcctyperelationshipcreated2022-01-26T16:18:10.395Zidrelationship--d7882682-1c8c-4c9f-a372-38be01f85789modified2022-01-26T16:18:10.395Zrelationship_typesubcontrol-ofsource_refcourse-of-action--154fd332-604b-442d-a307-0954e8da0488target_refcourse-of-action--7cc1e029-afae-4493-996d-4ece4189dfddtyperelationshipcreated2022-01-26T16:18:10.396Zidrelationship--c57c6964-62e0-469f-aaa3-fd61f7de05d1modified2022-01-26T16:18:10.396Zrelationship_typerelated-tosource_refcourse-of-action--223f93a7-5a65-4bc3-9cc5-ada5e71d0e71target_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2typerelationshipcreated2022-01-26T16:18:10.397Zidrelationship--2a24e0ec-a9f6-4b07-bc77-198738deaf15modified2022-01-26T16:18:10.397Zrelationship_typerelated-tosource_refcourse-of-action--4ce8375d-79cc-4639-963e-2b9834587761target_refcourse-of-action--97ccb097-da4b-48c1-9206-d6a0554f2b1dtyperelationshipcreated2022-01-26T16:18:10.398Zidrelationship--52c16c57-3295-48d6-b9f1-45f94e655c6amodified2022-01-26T16:18:10.398Zrelationship_typerelated-tosource_refcourse-of-action--7ac273cd-7e0f-4ccc-9ad0-85d184c0b129target_refcourse-of-action--23ed1a0b-6ea8-4bc0-a952-675c16fbcfcctyperelationshipcreated2022-01-26T16:18:10.399Zidrelationship--3a14be6f-a980-4499-bbe4-4ea8cef6e068modified2022-01-26T16:18:10.399Zrelationship_typerelated-tosource_refcourse-of-action--afe217f3-0c0b-41ea-bd25-97689e4cffb9target_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.400Zidrelationship--ab925b6e-2e9b-4a51-a09f-e35e4a4a3c33modified2022-01-26T16:18:10.400Zrelationship_typesubcontrol-ofsource_refcourse-of-action--3569a6b7-33c6-495f-bcd6-51b254a737e5target_refcourse-of-action--7ac273cd-7e0f-4ccc-9ad0-85d184c0b129typerelationshipcreated2022-01-26T16:18:10.401Zidrelationship--7f65166b-e972-4d9c-b6fd-a567440ec81bmodified2022-01-26T16:18:10.401Zrelationship_typerelated-tosource_refcourse-of-action--76d48617-8168-41d8-b2d2-69750f015518target_refcourse-of-action--8c70c121-fa3c-414f-ab07-3f353a01b119typerelationshipcreated2022-01-26T16:18:10.402Zidrelationship--32bde6af-e1e9-41cf-83bd-187357ba7989modified2022-01-26T16:18:10.402Zrelationship_typerelated-tosource_refcourse-of-action--76d48617-8168-41d8-b2d2-69750f015518target_refcourse-of-action--a06b165d-e478-43cf-86a2-d7c1a1ccc2d9typerelationshipcreated2022-01-26T16:18:10.403Zidrelationship--6d3c7f87-2780-40b4-a7ef-ab2910ad845emodified2022-01-26T16:18:10.403Zrelationship_typerelated-tosource_refcourse-of-action--8ce0c70d-0d54-40b2-92c5-0ff0a52486aetarget_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.404Zidrelationship--44269bdc-35c7-411d-b90b-846137be3ddfmodified2022-01-26T16:18:10.404Zrelationship_typerelated-tosource_refcourse-of-action--bb85b6c5-9d98-4a32-8c9e-9340153c2423target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.405Zidrelationship--1feb410f-aa76-453e-9749-e246eb614ca0modified2022-01-26T16:18:10.405Zrelationship_typerelated-tosource_refcourse-of-action--79c8c255-7dac-4a8c-ae75-58d23f1de357target_refcourse-of-action--a0e447c2-bbb0-44c9-b8ea-8855e138cacetyperelationshipcreated2022-01-26T16:18:10.406Zidrelationship--6714f963-c984-42f4-b917-7736f8bfe7c4modified2022-01-26T16:18:10.406Zrelationship_typerelated-tosource_refcourse-of-action--8c70c121-fa3c-414f-ab07-3f353a01b119target_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.407Zidrelationship--6b2eb354-14eb-4e8d-94b0-66f25f3a4ccfmodified2022-01-26T16:18:10.407Zrelationship_typerelated-tosource_refcourse-of-action--8c70c121-fa3c-414f-ab07-3f353a01b119target_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2typerelationshipcreated2022-01-26T16:18:10.408Zidrelationship--568641ce-b6aa-4433-af46-fed88a8c36d9modified2022-01-26T16:18:10.408Zrelationship_typerelated-tosource_refcourse-of-action--8d40f586-eb72-4fa7-8879-af698f4b863btarget_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.409Zidrelationship--7fe0c040-f35e-47f1-912e-39a347fc93f1modified2022-01-26T16:18:10.409Zrelationship_typerelated-tosource_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640target_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4typerelationshipcreated2022-01-26T16:18:10.410Zidrelationship--c01615b5-7752-4af3-a1c5-3b1d796dacf1modified2022-01-26T16:18:10.410Zrelationship_typerelated-tosource_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640target_refcourse-of-action--5d5b2609-035c-407f-b98d-00f78c82a8e0typerelationshipcreated2022-01-26T16:18:10.411Zidrelationship--1205c023-d364-446c-bfac-6340ce09fe4fmodified2022-01-26T16:18:10.411Zrelationship_typerelated-tosource_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640target_refcourse-of-action--622c311f-51f5-4ed8-aa89-797ec4a6ae2atyperelationshipcreated2022-01-26T16:18:10.412Zidrelationship--61fc8a26-ec16-4154-b89f-1b2b18391ea9modified2022-01-26T16:18:10.412Zrelationship_typesubcontrol-ofsource_refcourse-of-action--fe065199-ddd2-4fcb-af1d-6b4dae4208ddtarget_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.413Zidrelationship--7a159235-1461-4848-8df4-b500eeeb9237modified2022-01-26T16:18:10.413Zrelationship_typerelated-tosource_refcourse-of-action--8d52ad8e-74c0-4b42-877b-412581a6db7atarget_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.414Zidrelationship--ae151cb4-8196-4f2d-895c-955a18307642modified2022-01-26T16:18:10.414Zrelationship_typesubcontrol-ofsource_refcourse-of-action--f3ccb5b2-4eba-42c1-885e-6b55ec4ee7fdtarget_refcourse-of-action--8d52ad8e-74c0-4b42-877b-412581a6db7atyperelationshipcreated2022-01-26T16:18:10.415Zidrelationship--6e1ee8f3-6ec0-498d-b2b0-d9e12a7351femodified2022-01-26T16:18:10.415Zrelationship_typerelated-tosource_refcourse-of-action--11566761-08ca-4b6f-9c1a-fa3321457ffftarget_refcourse-of-action--77c86369-c6df-4e14-b5eb-0cd56df4ea70typerelationshipcreated2022-01-26T16:18:10.416Zidrelationship--0ae67891-ecc7-468e-8561-2a57dd94113dmodified2022-01-26T16:18:10.416Zrelationship_typerelated-tosource_refcourse-of-action--265141ac-f03a-4946-b34c-8de47acfcf4dtarget_refcourse-of-action--a81b990f-2787-4d13-a488-fbac1d4386c9typerelationshipcreated2022-01-26T16:18:10.417Zidrelationship--b7dd803d-7ee4-4c4d-a955-0c6f45a45950modified2022-01-26T16:18:10.417Zrelationship_typerelated-tosource_refcourse-of-action--ef7459df-caab-4ead-ab25-7c2adc80f329target_refcourse-of-action--2082d490-b34b-414b-9138-962ea7993e75typerelationshipcreated2022-01-26T16:18:10.418Zidrelationship--3cf50e6b-6292-41c9-80c8-6b0dbb27ae68modified2022-01-26T16:18:10.418Zrelationship_typerelated-tosource_refcourse-of-action--3929894c-3433-4874-8899-563a42305899target_refcourse-of-action--a675fe28-d45c-4283-89c6-1233471d546ctyperelationshipcreated2022-01-26T16:18:10.419Zidrelationship--9f4491c9-5ba5-43cc-add4-86faabf06286modified2022-01-26T16:18:10.419Zrelationship_typerelated-tosource_refcourse-of-action--a51d8cdf-4189-4918-a404-75b0b3a6dd9btarget_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80typerelationshipcreated2022-01-26T16:18:10.420Zidrelationship--ba87cc1e-470f-4543-90d9-bab47b762989modified2022-01-26T16:18:10.420Zrelationship_typerelated-tosource_refcourse-of-action--c2d6286c-2c27-4f16-88b8-3be07b395fectarget_refcourse-of-action--258702dc-b79d-4554-9b4d-57cff98cfa17typerelationshipcreated2022-01-26T16:18:10.421Zidrelationship--2e0fb434-ef75-4854-ba9b-221903585573modified2022-01-26T16:18:10.421Zrelationship_typerelated-tosource_refcourse-of-action--08f2eeb7-4343-4a07-9aa1-1991e4a1a408target_refcourse-of-action--a51d8cdf-4189-4918-a404-75b0b3a6dd9btyperelationshipcreated2022-01-26T16:18:10.422Zidrelationship--436615a7-9f5c-4a17-b838-8cf31b6fca15modified2022-01-26T16:18:10.422Zrelationship_typerelated-tosource_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304target_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btyperelationshipcreated2022-01-26T16:18:10.423Zidrelationship--a1ea948d-2818-4b04-97c2-b58cec43df18modified2022-01-26T16:18:10.423Zrelationship_typesubcontrol-ofsource_refcourse-of-action--20e705bb-8527-4e96-a973-92ee5f2257d6target_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.424Zidrelationship--b919bd5d-377c-4be0-a3b0-9673e0a99db7modified2022-01-26T16:18:10.424Zrelationship_typerelated-tosource_refcourse-of-action--a44cc794-26f7-4d95-845d-8dfe7fff8e61target_refcourse-of-action--bdd7942f-ac13-41c4-a077-61f9c0855662typerelationshipcreated2022-01-26T16:18:10.425Zidrelationship--1e599a8d-2fae-48b0-9471-d742d63ba37bmodified2022-01-26T16:18:10.425Zrelationship_typesubcontrol-ofsource_refcourse-of-action--88231aaf-e08e-4316-a262-debd778ea49btarget_refcourse-of-action--a4416d60-c97b-44b0-badd-68864c61c0dctyperelationshipcreated2022-01-26T16:18:10.426Zidrelationship--624dd678-bb86-45fe-ad00-e9a133ec8a74modified2022-01-26T16:18:10.426Zrelationship_typesubcontrol-ofsource_refcourse-of-action--4fa501cb-b4a2-42da-9fee-5de97ec79245target_refcourse-of-action--4fa84d6f-6221-45ba-8d37-3aaf629eb160typerelationshipcreated2022-01-26T16:18:10.427Zidrelationship--c6ba937b-27ac-451f-a127-742da6a2170bmodified2022-01-26T16:18:10.427Zrelationship_typerelated-tosource_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4target_refcourse-of-action--bdd7942f-ac13-41c4-a077-61f9c0855662typerelationshipcreated2022-01-26T16:18:10.428Zidrelationship--cb0e9338-4d4b-4482-87ec-ebff0ee8103fmodified2022-01-26T16:18:10.428Zrelationship_typerelated-tosource_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4target_refcourse-of-action--63e6a9f5-235c-48b0-8bd2-9f37e5fbade4typerelationshipcreated2022-01-26T16:18:10.429Zidrelationship--753a7fb5-c7b7-4aa6-bc2d-d645edb5ab0amodified2022-01-26T16:18:10.429Zrelationship_typerelated-tosource_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4target_refcourse-of-action--f95a2fa9-710d-40d0-8d4d-4005c5f974bbtyperelationshipcreated2022-01-26T16:18:10.430Zidrelationship--12985e3c-eebc-470a-93b3-d3e756ce0661modified2022-01-26T16:18:10.430Zrelationship_typerelated-tosource_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4target_refcourse-of-action--622c311f-51f5-4ed8-aa89-797ec4a6ae2atyperelationshipcreated2022-01-26T16:18:10.431Zidrelationship--82087720-89d2-4741-ace7-91ebbc42cfe1modified2022-01-26T16:18:10.431Zrelationship_typesubcontrol-ofsource_refcourse-of-action--5f21d549-544a-4063-9fbc-9d6abedc99dctarget_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4typerelationshipcreated2022-01-26T16:18:10.432Zidrelationship--6059658e-65c3-44b6-b45e-30c837b31ef4modified2022-01-26T16:18:10.432Zrelationship_typerelated-tosource_refcourse-of-action--3a097ee3-1428-4691-b525-a4af05653518target_refcourse-of-action--bc169b9a-1d81-4139-8db6-93b256da7068typerelationshipcreated2022-01-26T16:18:10.433Zidrelationship--9ba6c5a3-bc87-4c31-83c5-90eae71a4b6fmodified2022-01-26T16:18:10.433Zrelationship_typerelated-tosource_refcourse-of-action--3255dd20-27ea-4e0a-8800-ebc10aa963fetarget_refcourse-of-action--7185911a-88c5-45c8-9ab2-5e04ae0b7f9ctyperelationshipcreated2022-01-26T16:18:10.434Zidrelationship--227c1949-7bc6-40d0-9656-7e8bf571f9f4modified2022-01-26T16:18:10.434Zrelationship_typerelated-tosource_refcourse-of-action--bdd7942f-ac13-41c4-a077-61f9c0855662target_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4typerelationshipcreated2022-01-26T16:18:10.435Zidrelationship--32c8088f-7b1f-430e-8354-b33f3c89f96emodified2022-01-26T16:18:10.435Zrelationship_typerelated-tosource_refcourse-of-action--a4f541aa-b248-4fd0-8d46-2e52cba8234ctarget_refcourse-of-action--b8301f5c-f6e1-4979-938a-d482ccf0c3f7typerelationshipcreated2022-01-26T16:18:10.436Zidrelationship--288b80e1-fdad-4986-aff3-fc919b8ca317modified2022-01-26T16:18:10.436Zrelationship_typerelated-tosource_refcourse-of-action--7185911a-88c5-45c8-9ab2-5e04ae0b7f9ctarget_refcourse-of-action--898107b9-7127-4996-9bf7-881b97b13b26typerelationshipcreated2022-01-26T16:18:10.437Zidrelationship--21c693c2-a75c-41f5-8263-38cb3ddea57amodified2022-01-26T16:18:10.437Zrelationship_typesubcontrol-ofsource_refcourse-of-action--4b0a60fc-1be5-40e9-968b-83dcbd4ec491target_refcourse-of-action--7185911a-88c5-45c8-9ab2-5e04ae0b7f9ctyperelationshipcreated2022-01-26T16:18:10.438Zidrelationship--b5ee1c8b-7ac3-4942-b8cc-e0263a306bdbmodified2022-01-26T16:18:10.438Zrelationship_typerelated-tosource_refcourse-of-action--4f62435a-9c16-4bf5-9837-f2ee1f7c9d37target_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.439Zidrelationship--59ca70cb-6118-40f6-94b5-086435085b70modified2022-01-26T16:18:10.439Zrelationship_typerelated-tosource_refcourse-of-action--a2af383f-7caa-443e-8a66-95ab26ff4fc0target_refcourse-of-action--833f17ec-7979-4bf5-8e76-b56a09c1db91typerelationshipcreated2022-01-26T16:18:10.440Zidrelationship--332ae539-6ea0-48ca-bf21-07efb2193727modified2022-01-26T16:18:10.440Zrelationship_typerelated-tosource_refcourse-of-action--0465ee13-b727-41aa-90f6-9569d46b029atarget_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.441Zidrelationship--acdc09cf-0474-49db-8536-ee33864c0137modified2022-01-26T16:18:10.441Zrelationship_typerelated-tosource_refcourse-of-action--cd4f124e-ee9d-454f-b178-b3313fca76a8target_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.442Zidrelationship--8c4c32a1-43b7-4fb7-b167-eb6f088658d0modified2022-01-26T16:18:10.442Zrelationship_typerelated-tosource_refcourse-of-action--72e0775a-5d05-4998-ae3f-23ce40c2af5dtarget_refcourse-of-action--4fa84d6f-6221-45ba-8d37-3aaf629eb160typerelationshipcreated2022-01-26T16:18:10.443Zidrelationship--456903ad-eb03-4f51-9b7a-b29555e0cd53modified2022-01-26T16:18:10.443Zrelationship_typerelated-tosource_refcourse-of-action--bc169b9a-1d81-4139-8db6-93b256da7068target_refcourse-of-action--eb6efc87-9526-41de-a608-897c497957b4typerelationshipcreated2022-01-26T16:18:10.444Zidrelationship--cddb0589-e58e-4f87-a158-c05c90c7efb2modified2022-01-26T16:18:10.444Zrelationship_typerelated-tosource_refcourse-of-action--bb7547ed-e171-474a-93da-18146612391ftarget_refcourse-of-action--bdd7942f-ac13-41c4-a077-61f9c0855662typerelationshipcreated2022-01-26T16:18:10.445Zidrelationship--7f26c89d-aadc-4822-89af-9024b01c4675modified2022-01-26T16:18:10.445Zrelationship_typerelated-tosource_refcourse-of-action--ee3ad579-c221-4452-b3e0-02218cec7bfetarget_refcourse-of-action--4fa84d6f-6221-45ba-8d37-3aaf629eb160typerelationshipcreated2022-01-26T16:18:10.446Zidrelationship--9b4ee857-9ea8-45dc-b59d-296e4f05ea9emodified2022-01-26T16:18:10.446Zrelationship_typesubcontrol-ofsource_refcourse-of-action--48f3b5d8-6347-476d-b2a2-be3373cf80aftarget_refcourse-of-action--02bac81a-b871-4fbf-a788-cbd02976310ftyperelationshipcreated2022-01-26T16:18:10.447Zidrelationship--215f3619-d702-4c19-b9a5-dd8adfcc9547modified2022-01-26T16:18:10.447Zrelationship_typerelated-tosource_refcourse-of-action--2082d490-b34b-414b-9138-962ea7993e75target_refcourse-of-action--02113aaa-0ede-4474-8e9f-b4bdc833d5a2typerelationshipcreated2022-01-26T16:18:10.448Zidrelationship--9aa3579c-0632-4b54-bd42-af84444ef150modified2022-01-26T16:18:10.448Zrelationship_typerelated-tosource_refcourse-of-action--663e3ec9-624b-441d-8214-3756a3fed6cdtarget_refcourse-of-action--ba70c039-b7c8-4e52-a4a1-67ec7976b32etyperelationshipcreated2022-01-26T16:18:10.449Zidrelationship--5ab9af02-3572-4ea6-ac05-482acbb4b276modified2022-01-26T16:18:10.449Zrelationship_typerelated-tosource_refcourse-of-action--14d4fc80-4104-4c3e-b9d2-3fa6f8b01c3etarget_refcourse-of-action--02bac81a-b871-4fbf-a788-cbd02976310ftyperelationshipcreated2022-01-26T16:18:10.450Zidrelationship--77054afd-76fb-4fe3-934b-9f28e4bf6855modified2022-01-26T16:18:10.450Zrelationship_typesubcontrol-ofsource_refcourse-of-action--8d1dc37e-05cf-4b5f-8d6d-4a2fc1275d93target_refcourse-of-action--14d4fc80-4104-4c3e-b9d2-3fa6f8b01c3etyperelationshipcreated2022-01-26T16:18:10.451Zidrelationship--ba507107-3140-4c4b-98f3-fae8fe42ed9cmodified2022-01-26T16:18:10.451Zrelationship_typerelated-tosource_refcourse-of-action--9ea839f2-231a-41f3-8b92-43403632535atarget_refcourse-of-action--f6c136e8-4ab3-4bc4-90ec-6a5eb75a4eb6typerelationshipcreated2022-01-26T16:18:10.452Zidrelationship--b4ed6a88-451a-4221-96c9-9cb14cb0d7e8modified2022-01-26T16:18:10.452Zrelationship_typerelated-tosource_refcourse-of-action--a1500edf-5a20-4bd7-a652-2828e21a0d14target_refcourse-of-action--9ea839f2-231a-41f3-8b92-43403632535atyperelationshipcreated2022-01-26T16:18:10.453Zidrelationship--1f7281fb-e653-46cd-ad2d-03c07ba5402dmodified2022-01-26T16:18:10.453Zrelationship_typerelated-tosource_refcourse-of-action--a1500edf-5a20-4bd7-a652-2828e21a0d14target_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580typerelationshipcreated2022-01-26T16:18:10.454Zidrelationship--80720a88-5ddf-48c5-9475-e6cb73c30ddfmodified2022-01-26T16:18:10.454Zrelationship_typerelated-tosource_refcourse-of-action--3868eb22-f1b2-4308-ae68-9ccc537283a5target_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80typerelationshipcreated2022-01-26T16:18:10.455Zidrelationship--0ae0b54c-f060-4db1-b7af-232d854976e4modified2022-01-26T16:18:10.455Zrelationship_typerelated-tosource_refcourse-of-action--bb3c2193-6b01-4f51-9e21-010de55f4e12target_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.456Zidrelationship--0eb9cda3-4dbc-4f5a-976d-935e851822bamodified2022-01-26T16:18:10.456Zrelationship_typerelated-tosource_refcourse-of-action--bb3c2193-6b01-4f51-9e21-010de55f4e12target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.457Zidrelationship--f84d5694-07b0-4494-98d9-d55200b13951modified2022-01-26T16:18:10.457Zrelationship_typerelated-tosource_refcourse-of-action--b114030f-cc47-4b73-9fff-85048e34aca0target_refcourse-of-action--ad96cd68-18dc-4e88-a0c8-e351a1e4ef92typerelationshipcreated2022-01-26T16:18:10.458Zidrelationship--7868218c-7df1-49ac-bd68-9447c3169cacmodified2022-01-26T16:18:10.458Zrelationship_typerelated-tosource_refcourse-of-action--8e462662-29e9-4dd3-8ebb-fbc17d375c9dtarget_refcourse-of-action--d3069309-032a-4491-b9cc-e5a2feb62068typerelationshipcreated2022-01-26T16:18:10.459Zidrelationship--43fd8090-090b-400b-a531-c0cd4692afdamodified2022-01-26T16:18:10.459Zrelationship_typerelated-tosource_refcourse-of-action--6457ebc0-3a9a-4b8d-9e36-ac367b578cd9target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.460Zidrelationship--7e4b523a-f930-4808-89d8-0d098df7f913modified2022-01-26T16:18:10.460Zrelationship_typerelated-tosource_refcourse-of-action--bd2f5ba4-e3e1-4f83-8af9-b423ad518e9atarget_refcourse-of-action--ad96cd68-18dc-4e88-a0c8-e351a1e4ef92typerelationshipcreated2022-01-26T16:18:10.461Zidrelationship--069b1ce1-4c7d-45b8-8534-6c3fb468bc5fmodified2022-01-26T16:18:10.461Zrelationship_typesubcontrol-ofsource_refcourse-of-action--3cc8e51d-1396-4e78-b1bf-2af0f6bda400target_refcourse-of-action--bd2f5ba4-e3e1-4f83-8af9-b423ad518e9atyperelationshipcreated2022-01-26T16:18:10.462Zidrelationship--4873bfee-6dd7-46a7-907d-1a00c5c13e8fmodified2022-01-26T16:18:10.462Zrelationship_typerelated-tosource_refcourse-of-action--f6c136e8-4ab3-4bc4-90ec-6a5eb75a4eb6target_refcourse-of-action--ad96cd68-18dc-4e88-a0c8-e351a1e4ef92typerelationshipcreated2022-01-26T16:18:10.463Zidrelationship--9772ede1-71dc-447a-a6f6-213a7f842bd4modified2022-01-26T16:18:10.463Zrelationship_typerelated-tosource_refcourse-of-action--6c5297e1-c4dc-4be9-aa4f-633be3def1fdtarget_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.464Zidrelationship--b0e70578-0ee3-475e-b12f-62e334ed20cdmodified2022-01-26T16:18:10.464Zrelationship_typerelated-tosource_refcourse-of-action--d740537f-90d7-48ce-bf1f-ccf2f6e4f822target_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.465Zidrelationship--955f3572-e13c-41af-80a1-8bcc6ef870cdmodified2022-01-26T16:18:10.465Zrelationship_typerelated-tosource_refcourse-of-action--e62654da-8a22-43e5-b403-62d57a871c85target_refcourse-of-action--bd2f5ba4-e3e1-4f83-8af9-b423ad518e9atyperelationshipcreated2022-01-26T16:18:10.466Zidrelationship--d41c4c21-7598-4de4-af87-a0fe757ded5cmodified2022-01-26T16:18:10.466Zrelationship_typerelated-tosource_refcourse-of-action--bfe0f2c8-9913-4aa5-8422-ac3efa57c045target_refcourse-of-action--323be88c-9ad9-49b2-b3b2-85efabdb19eetyperelationshipcreated2022-01-26T16:18:10.467Zidrelationship--fe84a259-701c-4a01-be31-87671535dcdbmodified2022-01-26T16:18:10.467Zrelationship_typerelated-tosource_refcourse-of-action--2713f12f-2f42-4869-bc23-a0c62ec4ef6ftarget_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atyperelationshipcreated2022-01-26T16:18:10.468Zidrelationship--ca7560dc-f18a-4330-a776-0a63cff71e61modified2022-01-26T16:18:10.468Zrelationship_typesubcontrol-ofsource_refcourse-of-action--67c3ad73-8965-43f8-92df-e747b140c621target_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.469Zidrelationship--84427a20-056c-4dbe-843f-2d8fb8ba414emodified2022-01-26T16:18:10.469Zrelationship_typesubcontrol-ofsource_refcourse-of-action--08640e83-1e32-4363-8a68-4d484002d255target_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.470Zidrelationship--0bdd3fc9-859c-45a8-b5b8-cc65b26df244modified2022-01-26T16:18:10.470Zrelationship_typerelated-tosource_refcourse-of-action--e001775c-425c-4090-95ff-f4f3abbed92etarget_refcourse-of-action--d3069309-032a-4491-b9cc-e5a2feb62068typerelationshipcreated2022-01-26T16:18:10.471Zidrelationship--f6b7b528-71f9-4b13-a30f-8e8b6fc65ed1modified2022-01-26T16:18:10.471Zrelationship_typerelated-tosource_refcourse-of-action--75c5ff27-3eb1-485d-95e8-469615f336fctarget_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.472Zidrelationship--05f67cfb-8589-4755-8663-b675ac0b8156modified2022-01-26T16:18:10.472Zrelationship_typerelated-tosource_refcourse-of-action--25bb93d3-135b-4570-a762-374c7c966dbctarget_refcourse-of-action--37631d55-fe7f-4d6b-bf06-4ff350f8d5c3typerelationshipcreated2022-01-26T16:18:10.473Zidrelationship--608319e9-612b-4a19-bf52-c4e65b9f0b68modified2022-01-26T16:18:10.473Zrelationship_typesubcontrol-ofsource_refcourse-of-action--6320fa3b-c732-4894-944e-8f0a151b901dtarget_refcourse-of-action--b792e469-41e6-472c-935e-ea3b9588eda0typerelationshipcreated2022-01-26T16:18:10.474Zidrelationship--c11f8b53-2210-4abc-a737-5a3f3b156f9fmodified2022-01-26T16:18:10.474Zrelationship_typerelated-tosource_refcourse-of-action--2ce0bdb7-6ba8-4d10-b16d-876ca596001btarget_refcourse-of-action--a1500edf-5a20-4bd7-a652-2828e21a0d14typerelationshipcreated2022-01-26T16:18:10.475Zidrelationship--232800bb-6f85-439e-8f79-585319b9df64modified2022-01-26T16:18:10.475Zrelationship_typesubcontrol-ofsource_refcourse-of-action--c6be4afb-00dd-4fe7-b189-fb0a013c5f33target_refcourse-of-action--b792e469-41e6-472c-935e-ea3b9588eda0typerelationshipcreated2022-01-26T16:18:10.476Zidrelationship--badc4e56-a23b-4f04-9126-7a3f4d28cd6amodified2022-01-26T16:18:10.476Zrelationship_typerelated-tosource_refcourse-of-action--ad96cd68-18dc-4e88-a0c8-e351a1e4ef92target_refcourse-of-action--b114030f-cc47-4b73-9fff-85048e34aca0typerelationshipcreated2022-01-26T16:18:10.477Zidrelationship--882b989c-56ed-43c5-b35e-7f21581fdc7cmodified2022-01-26T16:18:10.477Zrelationship_typerelated-tosource_refcourse-of-action--66a27e9d-20c6-4cdc-942a-f5db8f21dc86target_refcourse-of-action--76d48617-8168-41d8-b2d2-69750f015518typerelationshipcreated2022-01-26T16:18:10.478Zidrelationship--bbb9e28c-3a6b-461c-a867-f426cfb3ee97modified2022-01-26T16:18:10.478Zrelationship_typerelated-tosource_refcourse-of-action--e2b61956-3147-417d-82f6-3b79f4a76fcatarget_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.479Zidrelationship--dab62095-0fc4-4419-932c-ffa485c2095fmodified2022-01-26T16:18:10.479Zrelationship_typesubcontrol-ofsource_refcourse-of-action--c361c4e1-dadb-4452-b17d-dec0dce1f2ebtarget_refcourse-of-action--e2b61956-3147-417d-82f6-3b79f4a76fcatyperelationshipcreated2022-01-26T16:18:10.480Zidrelationship--17e9656b-340b-48c8-80c2-ff4847646c11modified2022-01-26T16:18:10.480Zrelationship_typerelated-tosource_refcourse-of-action--197c1a5a-6c2e-4149-ac28-f28eeb2bcf97target_refcourse-of-action--11329cd2-a88f-4362-903c-08cb6324a816typerelationshipcreated2022-01-26T16:18:10.481Zidrelationship--6ebc46d9-d533-4bf9-8982-77c0fd8f8546modified2022-01-26T16:18:10.481Zrelationship_typerelated-tosource_refcourse-of-action--197c1a5a-6c2e-4149-ac28-f28eeb2bcf97target_refcourse-of-action--bedc506d-a5d9-401f-b612-aac641b40116typerelationshipcreated2022-01-26T16:18:10.482Zidrelationship--618f487b-afa7-4b82-b680-ca9141d0d7c5modified2022-01-26T16:18:10.482Zrelationship_typerelated-tosource_refcourse-of-action--25673877-a8d0-4a54-873d-e497024075c0target_refcourse-of-action--b8983fa9-6742-48a1-a2dc-14dc3c2e0ee8typerelationshipcreated2022-01-26T16:18:10.483Zidrelationship--6e2c0bf9-1b0b-4d94-a347-2af556c2756emodified2022-01-26T16:18:10.483Zrelationship_typesubcontrol-ofsource_refcourse-of-action--77f1fed3-376b-471a-b2cf-7f262b077c84target_refcourse-of-action--197c1a5a-6c2e-4149-ac28-f28eeb2bcf97typerelationshipcreated2022-01-26T16:18:10.484Zidrelationship--c485e689-a096-4b3b-8aec-f0d0b23fb02dmodified2022-01-26T16:18:10.484Zrelationship_typerelated-tosource_refcourse-of-action--38aad3f1-b211-497b-912e-920620d1dfb4target_refcourse-of-action--197c1a5a-6c2e-4149-ac28-f28eeb2bcf97typerelationshipcreated2022-01-26T16:18:10.485Zidrelationship--b10ef71b-a4bf-4de3-ac1e-c567d5773868modified2022-01-26T16:18:10.485Zrelationship_typesubcontrol-ofsource_refcourse-of-action--838357d8-3509-46eb-a5f3-faa895b3be66target_refcourse-of-action--b2828bb6-102b-4f0a-b368-b183a1943f1atyperelationshipcreated2022-01-26T16:18:10.486Zidrelationship--4f80c629-90c6-43f9-bdf2-20905fb03e8amodified2022-01-26T16:18:10.486Zrelationship_typerelated-tosource_refcourse-of-action--0c1cb378-fc95-4948-bb3c-ea272632ae95target_refcourse-of-action--57aa2d58-6f11-418e-b4e3-8d6f9950140atyperelationshipcreated2022-01-26T16:18:10.487Zidrelationship--4658466d-266c-41c1-ab16-49742817a9b3modified2022-01-26T16:18:10.487Zrelationship_typesubcontrol-ofsource_refcourse-of-action--56aa903e-bb54-415d-a4b0-5be6958e121btarget_refcourse-of-action--aa317f08-5a4a-49c6-b961-4c590ba7d713typerelationshipcreated2022-01-26T16:18:10.488Zidrelationship--90de2e4d-556a-4a5e-9686-20ecd108a857modified2022-01-26T16:18:10.488Zrelationship_typerelated-tosource_refcourse-of-action--d55495db-e7f6-499f-9262-4d4907e0e9e7target_refcourse-of-action--11329cd2-a88f-4362-903c-08cb6324a816typerelationshipcreated2022-01-26T16:18:10.489Zidrelationship--59c5dc03-078c-4523-9e5c-98d78e09e01emodified2022-01-26T16:18:10.489Zrelationship_typesubcontrol-ofsource_refcourse-of-action--76ed785c-906c-4326-b1be-014e8f626759target_refcourse-of-action--d55495db-e7f6-499f-9262-4d4907e0e9e7typerelationshipcreated2022-01-26T16:18:10.490Zidrelationship--82c8f81b-e07b-4f33-beac-3500937067e4modified2022-01-26T16:18:10.490Zrelationship_typesubcontrol-ofsource_refcourse-of-action--bb939caa-5305-486d-b9ed-425e87c2b661target_refcourse-of-action--d55495db-e7f6-499f-9262-4d4907e0e9e7typerelationshipcreated2022-01-26T16:18:10.491Zidrelationship--5bd42dff-e0b9-43f1-ba42-b2273749f665modified2022-01-26T16:18:10.491Zrelationship_typesubcontrol-ofsource_refcourse-of-action--6a7c39f3-5800-4535-90c4-c3c828f2deb4target_refcourse-of-action--11329cd2-a88f-4362-903c-08cb6324a816typerelationshipcreated2022-01-26T16:18:10.492Zidrelationship--8a11c193-dc34-448b-9ee6-21c76b34fbfamodified2022-01-26T16:18:10.492Zrelationship_typerelated-tosource_refcourse-of-action--97136ec8-c79a-47fa-b713-2e7ca503563ctarget_refcourse-of-action--116909fe-0005-4e32-a88b-1b0f6f66639btyperelationshipcreated2022-01-26T16:18:10.493Zidrelationship--198d4574-864b-47ba-b174-28a269da3376modified2022-01-26T16:18:10.493Zrelationship_typerelated-tosource_refcourse-of-action--96a97c45-63c7-43e0-acd7-f7a6b97339fdtarget_refcourse-of-action--b792e469-41e6-472c-935e-ea3b9588eda0typerelationshipcreated2022-01-26T16:18:10.494Zidrelationship--96abd39e-6962-4cc7-803b-77ad797f4f78modified2022-01-26T16:18:10.494Zrelationship_typerelated-tosource_refcourse-of-action--1d05fd56-b57a-4b31-80d6-88e4dd2965e4target_refcourse-of-action--57aa2d58-6f11-418e-b4e3-8d6f9950140atyperelationshipcreated2022-01-26T16:18:10.495Zidrelationship--376151ee-20f5-494e-bf57-a9ae097d60b5modified2022-01-26T16:18:10.495Zrelationship_typerelated-tosource_refcourse-of-action--57aa2d58-6f11-418e-b4e3-8d6f9950140atarget_refcourse-of-action--aa317f08-5a4a-49c6-b961-4c590ba7d713typerelationshipcreated2022-01-26T16:18:10.496Zidrelationship--eff8f179-3208-47ba-a628-7de98f83377fmodified2022-01-26T16:18:10.496Zrelationship_typesubcontrol-ofsource_refcourse-of-action--0fe2a870-3dd9-4d4e-a215-75050c509139target_refcourse-of-action--57aa2d58-6f11-418e-b4e3-8d6f9950140atyperelationshipcreated2022-01-26T16:18:10.497Zidrelationship--520ee3af-b2a8-4328-a243-a2f49160d4a5modified2022-01-26T16:18:10.497Zrelationship_typerelated-tosource_refcourse-of-action--790b26fd-249e-4709-8f75-1633eb5f0337target_refcourse-of-action--197c1a5a-6c2e-4149-ac28-f28eeb2bcf97typerelationshipcreated2022-01-26T16:18:10.498Zidrelationship--e2af3af3-8157-45ec-90fa-c41fe999f0c1modified2022-01-26T16:18:10.498Zrelationship_typerelated-tosource_refcourse-of-action--80cf81f5-9bf9-47a5-96f2-3b57a9251510target_refcourse-of-action--7e4a41a6-d1f0-471a-bff8-dedce7a1443dtyperelationshipcreated2022-01-26T16:18:10.499Zidrelationship--d6312f13-5208-46f0-b1a7-d89b50483276modified2022-01-26T16:18:10.499Zrelationship_typesubcontrol-ofsource_refcourse-of-action--08befe43-dc5f-468b-877b-32514d34f7e0target_refcourse-of-action--80cf81f5-9bf9-47a5-96f2-3b57a9251510typerelationshipcreated2022-01-26T16:18:10.500Zidrelationship--6caa7f60-709d-49ae-bfc5-6eb3056e0f52modified2022-01-26T16:18:10.500Zrelationship_typesubcontrol-ofsource_refcourse-of-action--9f1bd92b-7c8f-41ff-a016-f79694e8b516target_refcourse-of-action--80cf81f5-9bf9-47a5-96f2-3b57a9251510typerelationshipcreated2022-01-26T16:18:10.501Zidrelationship--1bed0b97-58a5-4cdd-8816-bc9a1ba10dfbmodified2022-01-26T16:18:10.501Zrelationship_typerelated-tosource_refcourse-of-action--7066d847-7bbe-4c1f-bed1-b5d12d046ebctarget_refcourse-of-action--4063f391-fa2d-4a03-bede-404b65045f4ctyperelationshipcreated2022-01-26T16:18:10.502Zidrelationship--e34c1ab9-ad30-44a4-a629-c1aaa5ed9176modified2022-01-26T16:18:10.502Zrelationship_typerelated-tosource_refcourse-of-action--5d5b2609-035c-407f-b98d-00f78c82a8e0target_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.503Zidrelationship--261e34c1-1b47-47f3-81f6-745aa8422986modified2022-01-26T16:18:10.503Zrelationship_typerelated-tosource_refcourse-of-action--06cfcf18-1dd2-419e-ba48-3db86efc1427target_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.504Zidrelationship--2f1f147b-11b7-4146-b31f-ca3a22b05bbdmodified2022-01-26T16:18:10.504Zrelationship_typesubcontrol-ofsource_refcourse-of-action--e1e50030-2fd7-4509-81b5-88456616a447target_refcourse-of-action--5d5b2609-035c-407f-b98d-00f78c82a8e0typerelationshipcreated2022-01-26T16:18:10.505Zidrelationship--148c62bb-4455-4e6d-b861-40a1a12bf78cmodified2022-01-26T16:18:10.505Zrelationship_typesubcontrol-ofsource_refcourse-of-action--c6c3c7c5-fc53-4244-88d0-9326a4afda16target_refcourse-of-action--7e4a41a6-d1f0-471a-bff8-dedce7a1443dtyperelationshipcreated2022-01-26T16:18:10.506Zidrelationship--d7a91512-e93d-4d91-a388-602335a74f67modified2022-01-26T16:18:10.506Zrelationship_typesubcontrol-ofsource_refcourse-of-action--8f48c1a8-8e70-46ad-abdc-3b6a3ab31cd3target_refcourse-of-action--7e4a41a6-d1f0-471a-bff8-dedce7a1443dtyperelationshipcreated2022-01-26T16:18:10.507Zidrelationship--eed7491a-69a5-4d55-8508-f618780d3f8dmodified2022-01-26T16:18:10.507Zrelationship_typerelated-tosource_refcourse-of-action--63e6a9f5-235c-48b0-8bd2-9f37e5fbade4target_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4typerelationshipcreated2022-01-26T16:18:10.508Zidrelationship--d3b0d526-2851-4efb-a669-1052f82a6197modified2022-01-26T16:18:10.508Zrelationship_typerelated-tosource_refcourse-of-action--63e6a9f5-235c-48b0-8bd2-9f37e5fbade4target_refcourse-of-action--47cc2615-6afb-4455-80ef-4f6ce2cb0691typerelationshipcreated2022-01-26T16:18:10.509Zidrelationship--84397eca-6cfa-4533-b20a-b18b2d4e6867modified2022-01-26T16:18:10.509Zrelationship_typerelated-tosource_refcourse-of-action--63ede202-e4fc-477f-a602-0e9cea8bc447target_refcourse-of-action--802ceb5e-299b-4cd7-a7be-caae355ab949typerelationshipcreated2022-01-26T16:18:10.510Zidrelationship--f415e8b6-de3c-45d0-9803-1abdcd7ade11modified2022-01-26T16:18:10.510Zrelationship_typerelated-tosource_refcourse-of-action--7df8eb3e-d925-4d41-8470-a7af6d7518d7target_refcourse-of-action--02113aaa-0ede-4474-8e9f-b4bdc833d5a2typerelationshipcreated2022-01-26T16:18:10.511Zidrelationship--79890824-f235-41a1-9ee7-54be2253ede1modified2022-01-26T16:18:10.511Zrelationship_typesubcontrol-ofsource_refcourse-of-action--634cfc4a-04ae-419e-a6b0-4e1d21a00ef4target_refcourse-of-action--63e6a9f5-235c-48b0-8bd2-9f37e5fbade4typerelationshipcreated2022-01-26T16:18:10.512Zidrelationship--3138c191-1992-400c-a274-4fcd8c4baab7modified2022-01-26T16:18:10.512Zrelationship_typerelated-tosource_refcourse-of-action--e12204f5-3c57-47fa-8626-55678c98f6d5target_refcourse-of-action--833f17ec-7979-4bf5-8e76-b56a09c1db91typerelationshipcreated2022-01-26T16:18:10.513Zidrelationship--f2b538aa-923d-46c4-a6d4-6888faaa491dmodified2022-01-26T16:18:10.513Zrelationship_typerelated-tosource_refcourse-of-action--a06b165d-e478-43cf-86a2-d7c1a1ccc2d9target_refcourse-of-action--7e4a41a6-d1f0-471a-bff8-dedce7a1443dtyperelationshipcreated2022-01-26T16:18:10.514Zidrelationship--35d5ed05-d3a9-4e21-98b0-c06c63899a68modified2022-01-26T16:18:10.514Zrelationship_typerelated-tosource_refcourse-of-action--fa4b19de-a734-48ae-8cf7-a4b1047eb11etarget_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.515Zidrelationship--26d266a0-7afa-4d92-9d85-63228c289e7cmodified2022-01-26T16:18:10.515Zrelationship_typesubcontrol-ofsource_refcourse-of-action--0fad1be1-a01e-4a57-9574-69cb190ab85btarget_refcourse-of-action--a06b165d-e478-43cf-86a2-d7c1a1ccc2d9typerelationshipcreated2022-01-26T16:18:10.516Zidrelationship--66abbbbb-b3f9-4236-be2a-a6dc500591b8modified2022-01-26T16:18:10.516Zrelationship_typerelated-tosource_refcourse-of-action--b82fdeb0-6a11-4574-b49e-49f19d3abf61target_refcourse-of-action--cf53299c-d329-49f7-a425-e282fe6bb000typerelationshipcreated2022-01-26T16:18:10.517Zidrelationship--860f8de6-ab10-4e7e-84b7-cf553249251cmodified2022-01-26T16:18:10.517Zrelationship_typerelated-tosource_refcourse-of-action--a95bc97a-eaad-43cc-9b3a-59bb50783ebetarget_refcourse-of-action--044d2ccf-37c8-453e-8f47-79fc58b7e154typerelationshipcreated2022-01-26T16:18:10.518Zidrelationship--9b2d5b48-feb9-45aa-b114-8f74f3d6b0dfmodified2022-01-26T16:18:10.518Zrelationship_typerelated-tosource_refcourse-of-action--a0223fb5-71b2-40bf-aacd-e584812a94fbtarget_refcourse-of-action--77c86369-c6df-4e14-b5eb-0cd56df4ea70typerelationshipcreated2022-01-26T16:18:10.519Zidrelationship--271f7834-23a6-40df-ab4c-4181b0786376modified2022-01-26T16:18:10.519Zrelationship_typerelated-tosource_refcourse-of-action--735facd3-04a2-4f20-a943-3fdb354c562ctarget_refcourse-of-action--03b1074a-7e75-4e01-b8dd-e14b7818c05ctyperelationshipcreated2022-01-26T16:18:10.520Zidrelationship--32e0aa84-3b61-4bdc-808d-91afb85a5623modified2022-01-26T16:18:10.520Zrelationship_typerelated-tosource_refcourse-of-action--735facd3-04a2-4f20-a943-3fdb354c562ctarget_refcourse-of-action--323be88c-9ad9-49b2-b3b2-85efabdb19eetyperelationshipcreated2022-01-26T16:18:10.521Zidrelationship--5bf1916a-95c6-497d-826d-ad5d73e6e723modified2022-01-26T16:18:10.521Zrelationship_typerelated-tosource_refcourse-of-action--c2b4d831-006c-4a55-8a1a-7317638e0e1dtarget_refcourse-of-action--bd2f5ba4-e3e1-4f83-8af9-b423ad518e9atyperelationshipcreated2022-01-26T16:18:10.522Zidrelationship--16c43815-4b3e-4880-a687-f39a08859accmodified2022-01-26T16:18:10.522Zrelationship_typesubcontrol-ofsource_refcourse-of-action--7fd39d20-9cb9-4553-9085-35ef1ca4eef5target_refcourse-of-action--735facd3-04a2-4f20-a943-3fdb354c562ctyperelationshipcreated2022-01-26T16:18:10.523Zidrelationship--af545e2b-2444-49ae-8bfb-9bd6fc3eedbamodified2022-01-26T16:18:10.523Zrelationship_typerelated-tosource_refcourse-of-action--c95155a3-e981-4ba5-b09c-c0735b3be570target_refcourse-of-action--127e5f0b-22f9-4214-a40f-33d2a09a0f18typerelationshipcreated2022-01-26T16:18:10.524Zidrelationship--ce6c137c-ed3e-4786-b7d5-54e3b25aca02modified2022-01-26T16:18:10.524Zrelationship_typerelated-tosource_refcourse-of-action--c267926b-0c14-4663-9c9f-371923f9bee8target_refcourse-of-action--735facd3-04a2-4f20-a943-3fdb354c562ctyperelationshipcreated2022-01-26T16:18:10.525Zidrelationship--8f8784c2-58cf-4303-8a69-e684d57f7752modified2022-01-26T16:18:10.525Zrelationship_typesubcontrol-ofsource_refcourse-of-action--3a21f721-e3dc-48e2-9eda-63234a374679target_refcourse-of-action--5dc83e88-fa62-4cdd-8445-a172dce57b28typerelationshipcreated2022-01-26T16:18:10.526Zidrelationship--baedc3a5-2c12-464b-b4bf-dd54f8a6b560modified2022-01-26T16:18:10.526Zrelationship_typesubcontrol-ofsource_refcourse-of-action--b9d35a02-7ef0-4045-b2da-fad5682f98bdtarget_refcourse-of-action--20328bf3-5979-48bb-be69-8067feb1f614typerelationshipcreated2022-01-26T16:18:10.527Zidrelationship--0ae1d241-4093-40e7-aca7-f7b92f1d65f4modified2022-01-26T16:18:10.527Zrelationship_typesubcontrol-ofsource_refcourse-of-action--2239a68d-0cbc-4e25-ac26-3054557084c5target_refcourse-of-action--6ee63e51-c922-4be9-8097-ece537bf346etyperelationshipcreated2022-01-26T16:18:10.528Zidrelationship--9142ac8f-d1e3-4242-9ee5-2d8903639253modified2022-01-26T16:18:10.528Zrelationship_typerelated-tosource_refcourse-of-action--b698f9b7-5bad-475e-81a8-ebab183f3f5atarget_refcourse-of-action--0f142743-6747-465f-91dd-57c3c6d11460typerelationshipcreated2022-01-26T16:18:10.529Zidrelationship--78e1e04b-218d-44bb-8ee1-560cf6a3eb63modified2022-01-26T16:18:10.529Zrelationship_typerelated-tosource_refcourse-of-action--1d3496df-1ffd-40df-97d4-25cbd093ad38target_refcourse-of-action--b0063eb6-8ca6-49ce-a305-3a435c16e937typerelationshipcreated2022-01-26T16:18:10.530Zidrelationship--33ba8962-754b-4462-baa3-28d61788d75bmodified2022-01-26T16:18:10.530Zrelationship_typerelated-tosource_refcourse-of-action--54ff4f2b-6af4-4797-8aba-0f5944140350target_refcourse-of-action--622c311f-51f5-4ed8-aa89-797ec4a6ae2atyperelationshipcreated2022-01-26T16:18:10.531Zidrelationship--ebc2915a-ec1f-4c62-9eb7-00dfcdf96ec0modified2022-01-26T16:18:10.531Zrelationship_typerelated-tosource_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btarget_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atyperelationshipcreated2022-01-26T16:18:10.532Zidrelationship--cbf9fb76-d0ca-43ac-a1d7-ce79bfba6f5dmodified2022-01-26T16:18:10.532Zrelationship_typerelated-tosource_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btarget_refcourse-of-action--7e4a41a6-d1f0-471a-bff8-dedce7a1443dtyperelationshipcreated2022-01-26T16:18:10.533Zidrelationship--4634ebdc-ea78-4d17-8cc5-fcd2e55ba028modified2022-01-26T16:18:10.533Zrelationship_typerelated-tosource_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btarget_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.534Zidrelationship--55114e85-05c2-4fd9-9c3a-a0f4c776c0d8modified2022-01-26T16:18:10.534Zrelationship_typerelated-tosource_refcourse-of-action--2f44246f-36ac-4260-8fe2-e56365c5cb92target_refcourse-of-action--bc169b9a-1d81-4139-8db6-93b256da7068typerelationshipcreated2022-01-26T16:18:10.535Zidrelationship--e5a5ea64-10e1-436e-8514-b27d6184e5d7modified2022-01-26T16:18:10.535Zrelationship_typesubcontrol-ofsource_refcourse-of-action--852fa86a-450f-48fc-82c7-ffcc8214c2b5target_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btyperelationshipcreated2022-01-26T16:18:10.536Zidrelationship--79a3d6ed-2cca-4e25-94bc-47dfb577651emodified2022-01-26T16:18:10.536Zrelationship_typerelated-tosource_refcourse-of-action--6707b970-997d-42b7-aee0-2a9cb7407c37target_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.537Zidrelationship--0bdf4454-a64a-4faa-bb24-f8ad05d91826modified2022-01-26T16:18:10.537Zrelationship_typerelated-tosource_refcourse-of-action--d7ae0fd8-8a87-4d22-ad25-dfb1a3c40f5ctarget_refcourse-of-action--496e72e3-0f57-48e7-97a4-f11b25b07fabtyperelationshipcreated2022-01-26T16:18:10.538Zidrelationship--108e3992-4566-452f-b862-2f1c0088f89fmodified2022-01-26T16:18:10.538Zrelationship_typesubcontrol-ofsource_refcourse-of-action--2ee49f65-d67d-45a9-86aa-da9302571ce0target_refcourse-of-action--d7ae0fd8-8a87-4d22-ad25-dfb1a3c40f5ctyperelationshipcreated2022-01-26T16:18:10.539Zidrelationship--48a029bc-7c40-47f0-a5c3-f8ae73b15fabmodified2022-01-26T16:18:10.539Zrelationship_typerelated-tosource_refcourse-of-action--9b87e7cb-4371-488b-bd25-436a47376613target_refcourse-of-action--d55495db-e7f6-499f-9262-4d4907e0e9e7typerelationshipcreated2022-01-26T16:18:10.540Zidrelationship--4a456d61-650e-45fc-b11f-273e0dffd3f2modified2022-01-26T16:18:10.540Zrelationship_typerelated-tosource_refcourse-of-action--40b34e90-5e3f-4d82-8d5b-2d5f4a4b4c58target_refcourse-of-action--c926efbd-81dc-46de-82f5-aab6324d7943typerelationshipcreated2022-01-26T16:18:10.541Zidrelationship--19012ab0-c952-4f99-bb1f-aa2e88cb6f70modified2022-01-26T16:18:10.541Zrelationship_typerelated-tosource_refcourse-of-action--3cea233c-2b49-41ab-a7ed-c74aabec92e4target_refcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dtyperelationshipcreated2022-01-26T16:18:10.542Zidrelationship--7d647296-6e4e-426f-9669-0fc386ef63fdmodified2022-01-26T16:18:10.542Zrelationship_typerelated-tosource_refcourse-of-action--898107b9-7127-4996-9bf7-881b97b13b26target_refcourse-of-action--aa317f08-5a4a-49c6-b961-4c590ba7d713typerelationshipcreated2022-01-26T16:18:10.543Zidrelationship--420c5829-64b0-4766-8a61-4c4964d32f22modified2022-01-26T16:18:10.543Zrelationship_typesubcontrol-ofsource_refcourse-of-action--4a7ea50f-c9a3-4ab7-9f3b-11aaf412bffdtarget_refcourse-of-action--898107b9-7127-4996-9bf7-881b97b13b26typerelationshipcreated2022-01-26T16:18:10.544Zidrelationship--c641f85f-934f-4a20-b79e-8ea2056c896cmodified2022-01-26T16:18:10.544Zrelationship_typerelated-tosource_refcourse-of-action--116909fe-0005-4e32-a88b-1b0f6f66639btarget_refcourse-of-action--97136ec8-c79a-47fa-b713-2e7ca503563ctyperelationshipcreated2022-01-26T16:18:10.545Zidrelationship--de2f4df1-ae84-4201-b689-0d4fdc6c5099modified2022-01-26T16:18:10.545Zrelationship_typerelated-tosource_refcourse-of-action--116909fe-0005-4e32-a88b-1b0f6f66639btarget_refcourse-of-action--c4e54f15-16d6-43d9-b417-ff53cfcc868etyperelationshipcreated2022-01-26T16:18:10.546Zidrelationship--eb22bd82-2921-4aad-9e74-f7262b9ba5fbmodified2022-01-26T16:18:10.546Zrelationship_typerelated-tosource_refcourse-of-action--ac98a2d9-0697-496d-8d19-2d6bb6b7ad85target_refcourse-of-action--b698f9b7-5bad-475e-81a8-ebab183f3f5atyperelationshipcreated2022-01-26T16:18:10.547Zidrelationship--76b73e2a-21ba-47b9-adbb-eca1ce595896modified2022-01-26T16:18:10.547Zrelationship_typesubcontrol-ofsource_refcourse-of-action--8d783202-ec9d-4596-83d7-1783dfbc0491target_refcourse-of-action--ac98a2d9-0697-496d-8d19-2d6bb6b7ad85typerelationshipcreated2022-01-26T16:18:10.548Zidrelationship--5ad48847-1e27-47df-a7af-c0fe994128bfmodified2022-01-26T16:18:10.548Zrelationship_typesubcontrol-ofsource_refcourse-of-action--a0fdd717-8836-4a64-81b4-6144120355bctarget_refcourse-of-action--ac98a2d9-0697-496d-8d19-2d6bb6b7ad85typerelationshipcreated2022-01-26T16:18:10.549Zidrelationship--7df48bb5-06f6-4bba-9fcf-be82c0feafbdmodified2022-01-26T16:18:10.549Zrelationship_typerelated-tosource_refcourse-of-action--15671da2-62d7-4b09-b6ec-29c45d2a058ctarget_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2typerelationshipcreated2022-01-26T16:18:10.550Zidrelationship--bf69b1e8-d1a3-4484-9308-f26843f29d13modified2022-01-26T16:18:10.550Zrelationship_typesubcontrol-ofsource_refcourse-of-action--692e3ada-431b-41f1-822d-18d6ca21697atarget_refcourse-of-action--f645343b-0ca4-4d8d-8c37-b94334dbaf99typerelationshipcreated2022-01-26T16:18:10.551Zidrelationship--cca2399a-090f-48ff-8294-4a2d3205d69bmodified2022-01-26T16:18:10.551Zrelationship_typerelated-tosource_refcourse-of-action--301d5267-a8c1-4549-b371-64160ff9fd0ftarget_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4typerelationshipcreated2022-01-26T16:18:10.552Zidrelationship--d1b15242-baee-407f-94ee-98f2b8500deemodified2022-01-26T16:18:10.552Zrelationship_typerelated-tosource_refcourse-of-action--ebd9dbbc-ca7e-41cd-8541-1f861512de30target_refcourse-of-action--8d5aac02-c088-4c97-959b-ef8e06c9f52btyperelationshipcreated2022-01-26T16:18:10.553Zidrelationship--a27d356f-9626-495b-9a02-20d53ed63365modified2022-01-26T16:18:10.553Zrelationship_typerelated-tosource_refcourse-of-action--4063f391-fa2d-4a03-bede-404b65045f4ctarget_refcourse-of-action--5fc36f6f-4403-4f6a-97ea-a51f6dc9817ctyperelationshipcreated2022-01-26T16:18:10.554Zidrelationship--139a6911-9186-437c-976a-92cbccd8e980modified2022-01-26T16:18:10.554Zrelationship_typerelated-tosource_refcourse-of-action--7ae0885e-2c1b-43a6-a804-c922c0fea912target_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.555Zidrelationship--44810f18-f002-4699-897f-fbf9997f0a09modified2022-01-26T16:18:10.555Zrelationship_typesubcontrol-ofsource_refcourse-of-action--7d139784-4ad3-49f4-b13f-6a4adb1244f5target_refcourse-of-action--4063f391-fa2d-4a03-bede-404b65045f4ctyperelationshipcreated2022-01-26T16:18:10.556Zidrelationship--21653901-0b19-4362-aff2-7c7262cfa547modified2022-01-26T16:18:10.556Zrelationship_typerelated-tosource_refcourse-of-action--5fc36f6f-4403-4f6a-97ea-a51f6dc9817ctarget_refcourse-of-action--258702dc-b79d-4554-9b4d-57cff98cfa17typerelationshipcreated2022-01-26T16:18:10.557Zidrelationship--ea79da1b-c8ae-4fb9-ba5f-aa9e87cc411dmodified2022-01-26T16:18:10.557Zrelationship_typerelated-tosource_refcourse-of-action--1b0821d1-c452-4049-be18-71e415754741target_refcourse-of-action--5fc36f6f-4403-4f6a-97ea-a51f6dc9817ctyperelationshipcreated2022-01-26T16:18:10.558Zidrelationship--5f1259fe-9d65-4b2a-9fdc-00c174a1344cmodified2022-01-26T16:18:10.558Zrelationship_typerelated-tosource_refcourse-of-action--b5dc398f-4968-4f23-852a-50f67a30eddetarget_refcourse-of-action--044d2ccf-37c8-453e-8f47-79fc58b7e154typerelationshipcreated2022-01-26T16:18:10.559Zidrelationship--3ada2f74-6e75-452a-b50c-9a539428b9a2modified2022-01-26T16:18:10.559Zrelationship_typerelated-tosource_refcourse-of-action--04b165b0-ae8e-49ac-82e6-5e574717810btarget_refcourse-of-action--a675fe28-d45c-4283-89c6-1233471d546ctyperelationshipcreated2022-01-26T16:18:10.560Zidrelationship--9314854d-a6b0-4f33-9a78-13aef056a467modified2022-01-26T16:18:10.560Zrelationship_typesubcontrol-ofsource_refcourse-of-action--de03f7fc-54c7-4fbe-bea1-b681119d630ftarget_refcourse-of-action--0587ac83-5928-44cd-9a2a-4ff85ff95722typerelationshipcreated2022-01-26T16:18:10.561Zidrelationship--186bc1ce-9afb-4c72-875e-0a7a3cc7cd00modified2022-01-26T16:18:10.561Zrelationship_typerelated-tosource_refcourse-of-action--b8983fa9-6742-48a1-a2dc-14dc3c2e0ee8target_refcourse-of-action--d55495db-e7f6-499f-9262-4d4907e0e9e7typerelationshipcreated2022-01-26T16:18:10.562Zidrelationship--aad4efa9-a398-47e8-b816-745db5d39f36modified2022-01-26T16:18:10.562Zrelationship_typesubcontrol-ofsource_refcourse-of-action--204f76f0-30c7-4474-92d7-0269859dd2b8target_refcourse-of-action--f95a2fa9-710d-40d0-8d4d-4005c5f974bbtyperelationshipcreated2022-01-26T16:18:10.563Zidrelationship--7764d555-ccff-4fdb-9431-36daf562f6d6modified2022-01-26T16:18:10.563Zrelationship_typerelated-tosource_refcourse-of-action--0f142743-6747-465f-91dd-57c3c6d11460target_refcourse-of-action--116909fe-0005-4e32-a88b-1b0f6f66639btyperelationshipcreated2022-01-26T16:18:10.564Zidrelationship--ce3440df-8489-48e6-b699-49e3a32ef072modified2022-01-26T16:18:10.564Zrelationship_typesubcontrol-ofsource_refcourse-of-action--dafba3d9-3469-4883-8540-d82dc1e161e0target_refcourse-of-action--43415426-0eb0-4bb7-bbbf-6a6204c5766ctyperelationshipcreated2022-01-26T16:18:10.565Zidrelationship--03b5a434-2058-42d0-a099-bdb5e9da24cemodified2022-01-26T16:18:10.565Zrelationship_typerelated-tosource_refcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dtarget_refcourse-of-action--76d48617-8168-41d8-b2d2-69750f015518typerelationshipcreated2022-01-26T16:18:10.566Zidrelationship--d5d98073-e374-4ca4-b455-f060bfae56d1modified2022-01-26T16:18:10.566Zrelationship_typerelated-tosource_refcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dtarget_refcourse-of-action--044d2ccf-37c8-453e-8f47-79fc58b7e154typerelationshipcreated2022-01-26T16:18:10.567Zidrelationship--57281e3a-6344-4a95-8c7d-3ffc23a5b237modified2022-01-26T16:18:10.567Zrelationship_typerelated-tosource_refcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dtarget_refcourse-of-action--378b89e7-6d39-4942-82e8-8317949858eatyperelationshipcreated2022-01-26T16:18:10.568Zidrelationship--84da9238-70fa-4972-bb84-b8cacc27b517modified2022-01-26T16:18:10.568Zrelationship_typesubcontrol-ofsource_refcourse-of-action--415dd80d-f62d-4130-9e8b-44b7502e8976target_refcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dtyperelationshipcreated2022-01-26T16:18:10.569Zidrelationship--4afce3eb-fd65-46fc-bb74-a5652944179emodified2022-01-26T16:18:10.569Zrelationship_typerelated-tosource_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2target_refcourse-of-action--f31edf4a-e69a-41aa-9f5a-7c186babc399typerelationshipcreated2022-01-26T16:18:10.570Zidrelationship--da95b28f-2a8a-45b1-89c8-d8531e983548modified2022-01-26T16:18:10.570Zrelationship_typerelated-tosource_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2target_refcourse-of-action--a51d8cdf-4189-4918-a404-75b0b3a6dd9btyperelationshipcreated2022-01-26T16:18:10.571Zidrelationship--6f85a9aa-070c-40a4-8784-c871e95e9519modified2022-01-26T16:18:10.571Zrelationship_typerelated-tosource_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2target_refcourse-of-action--0f3641f4-6280-44ae-8d1c-9a7a2fecb5e0typerelationshipcreated2022-01-26T16:18:10.572Zidrelationship--a962062e-cff8-4f50-80bb-953c71669701modified2022-01-26T16:18:10.572Zrelationship_typerelated-tosource_refcourse-of-action--5085d03e-fa6f-445f-a899-d89b7ccd7546target_refcourse-of-action--0a762945-ced2-4139-ab4d-4dd7e05bf65ftyperelationshipcreated2022-01-26T16:18:10.573Zidrelationship--26ff4a51-471d-4d72-8bfd-ba18a8439ca4modified2022-01-26T16:18:10.573Zrelationship_typesubcontrol-ofsource_refcourse-of-action--379d7269-1dda-435a-8e3d-eb4d394fb7c1target_refcourse-of-action--5085d03e-fa6f-445f-a899-d89b7ccd7546typerelationshipcreated2022-01-26T16:18:10.574Zidrelationship--aa81d1c5-5ffd-40fc-8eb0-60fef3998adamodified2022-01-26T16:18:10.574Zrelationship_typerelated-tosource_refcourse-of-action--a675fe28-d45c-4283-89c6-1233471d546ctarget_refcourse-of-action--7e4a41a6-d1f0-471a-bff8-dedce7a1443dtyperelationshipcreated2022-01-26T16:18:10.575Zidrelationship--9ce1db56-4175-454d-b2c2-6fe9b84ee63emodified2022-01-26T16:18:10.575Zrelationship_typerelated-tosource_refcourse-of-action--3f5d61df-1761-4766-9b38-897e526e4105target_refcourse-of-action--95b7bc03-db34-4167-9991-ccf90df2fed4typerelationshipcreated2022-01-26T16:18:10.576Zidrelationship--0de55ea0-3549-438f-8fd3-60d909c511e1modified2022-01-26T16:18:10.576Zrelationship_typerelated-tosource_refcourse-of-action--6769db20-d28f-4948-b7a4-150b5a5551betarget_refcourse-of-action--a0e447c2-bbb0-44c9-b8ea-8855e138cacetyperelationshipcreated2022-01-26T16:18:10.577Zidrelationship--2e2eb5e9-247c-43f8-aaae-ab41a73fff76modified2022-01-26T16:18:10.577Zrelationship_typerelated-tosource_refcourse-of-action--a0e447c2-bbb0-44c9-b8ea-8855e138cacetarget_refcourse-of-action--9ac674ec-1e4d-4be6-9c60-8cf52ca99ba2typerelationshipcreated2022-01-26T16:18:10.578Zidrelationship--443abdbc-e705-4f65-a800-9a9688153b5emodified2022-01-26T16:18:10.578Zrelationship_typesubcontrol-ofsource_refcourse-of-action--a1e05034-fda4-4691-a35b-54998d628626target_refcourse-of-action--a0e447c2-bbb0-44c9-b8ea-8855e138cacetyperelationshipcreated2022-01-26T16:18:10.579Zidrelationship--d3ef3726-3295-4303-85ec-e310ae49de5fmodified2022-01-26T16:18:10.579Zrelationship_typerelated-tosource_refcourse-of-action--0229fb27-b993-4622-960e-7d023e7a1825target_refcourse-of-action--5b140120-19b9-4dd1-8de2-d342a78d80a6typerelationshipcreated2022-01-26T16:18:10.580Zidrelationship--190d6095-bc34-404b-913e-0b8cb24024c7modified2022-01-26T16:18:10.580Zrelationship_typerelated-tosource_refcourse-of-action--45e7aff9-94a9-4cee-970a-cd66c10a7ba8target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.581Zidrelationship--2b98f97c-807c-4442-9ad1-1ab79a3428bcmodified2022-01-26T16:18:10.581Zrelationship_typerelated-tosource_refcourse-of-action--02113aaa-0ede-4474-8e9f-b4bdc833d5a2target_refcourse-of-action--45e7aff9-94a9-4cee-970a-cd66c10a7ba8typerelationshipcreated2022-01-26T16:18:10.582Zidrelationship--460e5087-7f94-4748-92be-dfe797a0e96amodified2022-01-26T16:18:10.582Zrelationship_typerelated-tosource_refcourse-of-action--b222319c-b896-4eef-9cc2-5d04a628c648target_refcourse-of-action--622c311f-51f5-4ed8-aa89-797ec4a6ae2atyperelationshipcreated2022-01-26T16:18:10.583Zidrelationship--52c76cc2-ec72-4985-9b89-bf77d1f88178modified2022-01-26T16:18:10.583Zrelationship_typerelated-tosource_refcourse-of-action--0c102591-4033-455d-974f-6350eeb6d002target_refcourse-of-action--735facd3-04a2-4f20-a943-3fdb354c562ctyperelationshipcreated2022-01-26T16:18:10.584Zidrelationship--7688865d-9ff6-44ba-85b3-16d4cc82966fmodified2022-01-26T16:18:10.584Zrelationship_typesubcontrol-ofsource_refcourse-of-action--081334be-dc45-4e67-a83e-7129ea6d7793target_refcourse-of-action--02113aaa-0ede-4474-8e9f-b4bdc833d5a2typerelationshipcreated2022-01-26T16:18:10.585Zidrelationship--01eedd69-5a7d-4905-bfc7-930c7d2f752bmodified2022-01-26T16:18:10.585Zrelationship_typerelated-tosource_refcourse-of-action--0fb8943a-feaf-43e0-bf8a-255df11f0aa4target_refcourse-of-action--c89fe154-b513-4bef-b074-51791c02d196typerelationshipcreated2022-01-26T16:18:10.586Zidrelationship--a4d218a4-45fe-4101-a024-befe03de5a5bmodified2022-01-26T16:18:10.586Zrelationship_typerelated-tosource_refcourse-of-action--10b1d0f1-617c-4a21-b67e-a17fa12c44d3target_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580typerelationshipcreated2022-01-26T16:18:10.587Zidrelationship--c3c83d36-d9be-4e99-a2b6-83f380bf31cfmodified2022-01-26T16:18:10.587Zrelationship_typerelated-tosource_refcourse-of-action--14372b11-9b58-4bb2-9388-dcad989cdbd2target_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80typerelationshipcreated2022-01-26T16:18:10.588Zidrelationship--d113ae21-f82b-48ad-b554-632ad9179429modified2022-01-26T16:18:10.588Zrelationship_typerelated-tosource_refcourse-of-action--d6270942-179a-47ef-9eea-ea50e774e825target_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.589Zidrelationship--2fff273b-267f-4067-ba43-c8ea30521c80modified2022-01-26T16:18:10.589Zrelationship_typerelated-tosource_refcourse-of-action--847e79cd-b67f-4a61-b899-36cb9a4900d8target_refcourse-of-action--d3069309-032a-4491-b9cc-e5a2feb62068typerelationshipcreated2022-01-26T16:18:10.590Zidrelationship--edbdbd68-65a3-4038-a7b1-1f7ece06bf29modified2022-01-26T16:18:10.590Zrelationship_typerelated-tosource_refcourse-of-action--aa1ec496-0352-4e25-8c98-e842a21bbafftarget_refcourse-of-action--578f35db-e0ba-4a34-8fb0-fe61f834c50dtyperelationshipcreated2022-01-26T16:18:10.591Zidrelationship--562aaafb-94d1-45bd-b915-1d3e0aacd349modified2022-01-26T16:18:10.591Zrelationship_typesubcontrol-ofsource_refcourse-of-action--4871e928-e6ca-4ba9-925f-a2380b41f523target_refcourse-of-action--aa1ec496-0352-4e25-8c98-e842a21bbafftyperelationshipcreated2022-01-26T16:18:10.592Zidrelationship--bc140fd5-7b02-46f7-aebe-384b19afb7ddmodified2022-01-26T16:18:10.592Zrelationship_typerelated-tosource_refcourse-of-action--c89fe154-b513-4bef-b074-51791c02d196target_refcourse-of-action--7b328b08-fdd6-4b98-b906-1620ccd14536typerelationshipcreated2022-01-26T16:18:10.593Zidrelationship--cdd25da5-7e1d-4cc4-8134-bdda1ae16ae1modified2022-01-26T16:18:10.593Zrelationship_typerelated-tosource_refcourse-of-action--e55db424-dba1-497e-83fb-5a32f6b762a2target_refcourse-of-action--496e72e3-0f57-48e7-97a4-f11b25b07fabtyperelationshipcreated2022-01-26T16:18:10.594Zidrelationship--9af8f701-1cd5-4fdb-a808-1345fc1ec801modified2022-01-26T16:18:10.594Zrelationship_typerelated-tosource_refcourse-of-action--ff0d7bc0-e251-4199-8c5f-4d404c9dcf0etarget_refcourse-of-action--ad96cd68-18dc-4e88-a0c8-e351a1e4ef92typerelationshipcreated2022-01-26T16:18:10.595Zidrelationship--10d441e3-829e-4c5d-b118-4da8029a5448modified2022-01-26T16:18:10.595Zrelationship_typerelated-tosource_refcourse-of-action--1428c728-0f6f-4c59-a810-b36c90fc9c8dtarget_refcourse-of-action--323be88c-9ad9-49b2-b3b2-85efabdb19eetyperelationshipcreated2022-01-26T16:18:10.596Zidrelationship--2f8ee107-cf8b-4591-a4b2-83c96e68fbc3modified2022-01-26T16:18:10.596Zrelationship_typerelated-tosource_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580target_refcourse-of-action--10b1d0f1-617c-4a21-b67e-a17fa12c44d3typerelationshipcreated2022-01-26T16:18:10.597Zidrelationship--8f974d4b-0f4c-4ff9-a0d9-f8cb033477ffmodified2022-01-26T16:18:10.597Zrelationship_typesubcontrol-ofsource_refcourse-of-action--25e6c737-c25b-49ab-9852-c1073f711868target_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580typerelationshipcreated2022-01-26T16:18:10.598Zidrelationship--98821f62-bcd9-48d7-8542-9b3989ebb862modified2022-01-26T16:18:10.598Zrelationship_typesubcontrol-ofsource_refcourse-of-action--ed72c04d-defa-405c-833d-0d62492c2578target_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580typerelationshipcreated2022-01-26T16:18:10.599Zidrelationship--2326b9de-e33e-4eb8-9923-937fc7fde72emodified2022-01-26T16:18:10.599Zrelationship_typerelated-tosource_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80target_refcourse-of-action--5085d03e-fa6f-445f-a899-d89b7ccd7546typerelationshipcreated2022-01-26T16:18:10.600Zidrelationship--ebc664b3-d604-4874-86f4-a0e01b1495e6modified2022-01-26T16:18:10.600Zrelationship_typerelated-tosource_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80target_refcourse-of-action--a6ed361e-3cb5-4375-bca1-eb1e4b61ff04typerelationshipcreated2022-01-26T16:18:10.601Zidrelationship--821c4809-2006-472c-b2a1-65ddb65a7e30modified2022-01-26T16:18:10.601Zrelationship_typerelated-tosource_refcourse-of-action--ba536747-a167-47ee-b6c0-f931861840bdtarget_refcourse-of-action--795a843b-6df6-4dcd-b6b8-1d6fca6a766dtyperelationshipcreated2022-01-26T16:18:10.602Zidrelationship--42ffba34-1976-47b8-b76f-f9e9c535858emodified2022-01-26T16:18:10.602Zrelationship_typerelated-tosource_refcourse-of-action--cd62d31b-f957-47fc-afb0-ebc051a4142ftarget_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580typerelationshipcreated2022-01-26T16:18:10.603Zidrelationship--fff8fd9e-6701-4755-a02a-6dfe2ce7eed1modified2022-01-26T16:18:10.603Zrelationship_typesubcontrol-ofsource_refcourse-of-action--f333a1b9-6d5a-4718-95f3-6fefb51057d2target_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80typerelationshipcreated2022-01-26T16:18:10.604Zidrelationship--a0bcd05a-a454-49c4-8f8a-4583e2e0a107modified2022-01-26T16:18:10.604Zrelationship_typerelated-tosource_refcourse-of-action--c3fa1cc0-d056-486b-94d3-9333c7536774target_refcourse-of-action--5aebfabc-a2a1-486c-9a04-ce19bd40dea4typerelationshipcreated2022-01-26T16:18:10.605Zidrelationship--1f07e990-c878-473d-9ac5-f2a2cec6e9e8modified2022-01-26T16:18:10.605Zrelationship_typerelated-tosource_refcourse-of-action--5aebfabc-a2a1-486c-9a04-ce19bd40dea4target_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80typerelationshipcreated2022-01-26T16:18:10.606Zidrelationship--957c25f3-a644-4e65-bb01-688894dc6857modified2022-01-26T16:18:10.606Zrelationship_typesubcontrol-ofsource_refcourse-of-action--0206fe68-11fc-485f-bb7b-c82fd3c65aa7target_refcourse-of-action--e8c010f0-f67c-4875-96bb-6aa619b1f18dtyperelationshipcreated2022-01-26T16:18:10.607Zidrelationship--c82dbcc9-945a-4360-941d-e347ecc7389cmodified2022-01-26T16:18:10.607Zrelationship_typesubcontrol-ofsource_refcourse-of-action--a5211341-1119-4cdf-8b83-a29afc4fe28btarget_refcourse-of-action--e8c010f0-f67c-4875-96bb-6aa619b1f18dtyperelationshipcreated2022-01-26T16:18:10.608Zidrelationship--cac158c2-8dc7-42d8-893a-06df4607a75fmodified2022-01-26T16:18:10.608Zrelationship_typesubcontrol-ofsource_refcourse-of-action--980ba873-8e76-41ac-9e9e-0714a38805b1target_refcourse-of-action--e8c010f0-f67c-4875-96bb-6aa619b1f18dtyperelationshipcreated2022-01-26T16:18:10.609Zidrelationship--a4b2349f-d316-476e-8d3d-1a6c68910b89modified2022-01-26T16:18:10.609Zrelationship_typerelated-tosource_refcourse-of-action--405f497b-5e91-461d-be87-02524acbb681target_refcourse-of-action--5085d03e-fa6f-445f-a899-d89b7ccd7546typerelationshipcreated2022-01-26T16:18:10.610Zidrelationship--fbd9e52b-1a2c-44a9-99b6-23f467aeacbbmodified2022-01-26T16:18:10.610Zrelationship_typesubcontrol-ofsource_refcourse-of-action--f1ded6b6-a3c3-49c7-9181-300e0fde6844target_refcourse-of-action--405f497b-5e91-461d-be87-02524acbb681typerelationshipcreated2022-01-26T16:18:10.611Zidrelationship--f0acce93-4c69-4659-93dc-f634021055d3modified2022-01-26T16:18:10.611Zrelationship_typerelated-tosource_refcourse-of-action--26bee989-fc69-4a4c-b167-873b167d8318target_refcourse-of-action--ef0a7f4c-68e6-4162-8b16-345cd93d0580typerelationshipcreated2022-01-26T16:18:10.612Zidrelationship--bf8ae5e6-56df-4281-b4ad-91265dba0ef4modified2022-01-26T16:18:10.612Zrelationship_typesubcontrol-ofsource_refcourse-of-action--fa41bd02-09bb-4df1-82f7-f4be945d52datarget_refcourse-of-action--a6ed361e-3cb5-4375-bca1-eb1e4b61ff04typerelationshipcreated2022-01-26T16:18:10.613Zidrelationship--83448f6e-fd87-41c9-a0ea-39a8702af0c2modified2022-01-26T16:18:10.613Zrelationship_typesubcontrol-ofsource_refcourse-of-action--c7a5004a-f696-4997-826b-7b8c84c84144target_refcourse-of-action--795a843b-6df6-4dcd-b6b8-1d6fca6a766dtyperelationshipcreated2022-01-26T16:18:10.614Zidrelationship--ae497c47-202f-4b9a-94b8-2c54609b5468modified2022-01-26T16:18:10.614Zrelationship_typerelated-tosource_refcourse-of-action--5b140120-19b9-4dd1-8de2-d342a78d80a6target_refcourse-of-action--0229fb27-b993-4622-960e-7d023e7a1825typerelationshipcreated2022-01-26T16:18:10.615Zidrelationship--3f83be68-e0b7-4788-b22c-5a414db3ef48modified2022-01-26T16:18:10.615Zrelationship_typerelated-tosource_refcourse-of-action--7b328b08-fdd6-4b98-b906-1620ccd14536target_refcourse-of-action--c89fe154-b513-4bef-b074-51791c02d196typerelationshipcreated2022-01-26T16:18:10.616Zidrelationship--e4caaafd-df09-4cb6-9531-6911e2c13294modified2022-01-26T16:18:10.616Zrelationship_typerelated-tosource_refcourse-of-action--a81b990f-2787-4d13-a488-fbac1d4386c9target_refcourse-of-action--c89fe154-b513-4bef-b074-51791c02d196typerelationshipcreated2022-01-26T16:18:10.617Zidrelationship--7d0341b1-ee43-4897-951b-d85e842eceaemodified2022-01-26T16:18:10.617Zrelationship_typesubcontrol-ofsource_refcourse-of-action--d07337df-6949-4cc5-8702-8ab7face00a3target_refcourse-of-action--a81b990f-2787-4d13-a488-fbac1d4386c9typerelationshipcreated2022-01-26T16:18:10.618Zidrelationship--979ffae1-b665-459a-92fc-b9501c197113modified2022-01-26T16:18:10.618Zrelationship_typesubcontrol-ofsource_refcourse-of-action--d4324b52-b003-4ea7-b020-68550eaf9ef5target_refcourse-of-action--97443212-922f-43dc-aab8-78a2e5ba4ed1typerelationshipcreated2022-01-26T16:18:10.619Zidrelationship--7894b154-59dd-40a6-a02b-0005390b00b7modified2022-01-26T16:18:10.619Zrelationship_typerelated-tosource_refcourse-of-action--4a5383cb-8c56-4512-8ca6-7ab34cc414a6target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.620Zidrelationship--0ebda74d-0ed2-46c6-b051-0c348e436787modified2022-01-26T16:18:10.620Zrelationship_typerelated-tosource_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489target_refcourse-of-action--127e5f0b-22f9-4214-a40f-33d2a09a0f18typerelationshipcreated2022-01-26T16:18:10.621Zidrelationship--328812a3-fbfd-447a-89d3-1c3b470acfb3modified2022-01-26T16:18:10.621Zrelationship_typesubcontrol-ofsource_refcourse-of-action--7b939b3d-aa00-4a64-b41d-a071001745d1target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.622Zidrelationship--8206ea6e-349e-414c-b055-8f6ad0772232modified2022-01-26T16:18:10.622Zrelationship_typerelated-tosource_refcourse-of-action--89cba662-e413-42d8-a493-c01b61b2aae5target_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.623Zidrelationship--02cc665f-2f66-465b-a09f-bcbed13d55a2modified2022-01-26T16:18:10.623Zrelationship_typesubcontrol-ofsource_refcourse-of-action--a38e4964-834c-4ec2-b6e6-a0e62904c038target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.624Zidrelationship--23379337-4192-4ea3-940e-6ef5aa1f8559modified2022-01-26T16:18:10.624Zrelationship_typesubcontrol-ofsource_refcourse-of-action--4775db4b-a507-4416-87e7-1665f215856atarget_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.625Zidrelationship--eb71abbc-2c5d-45a7-aa2a-56715df8b6aemodified2022-01-26T16:18:10.625Zrelationship_typerelated-tosource_refcourse-of-action--46364eb1-a978-4d9f-b711-f75f42b326c2target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.626Zidrelationship--aaa85a2b-e96e-4f68-8f5e-ea687f732662modified2022-01-26T16:18:10.626Zrelationship_typerelated-tosource_refcourse-of-action--d6d73791-4c9c-4db9-b2f7-a64d4c9a722btarget_refcourse-of-action--197c1a5a-6c2e-4149-ac28-f28eeb2bcf97typerelationshipcreated2022-01-26T16:18:10.627Zidrelationship--ef505e8e-aeed-4efc-958e-f7beb551af3amodified2022-01-26T16:18:10.627Zrelationship_typesubcontrol-ofsource_refcourse-of-action--1c13c5a6-e31d-4f65-a078-d87d9004b346target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.628Zidrelationship--0994f20c-1aa1-4e67-ba1d-5289d47a98cemodified2022-01-26T16:18:10.628Zrelationship_typerelated-tosource_refcourse-of-action--cf53299c-d329-49f7-a425-e282fe6bb000target_refcourse-of-action--5fc36f6f-4403-4f6a-97ea-a51f6dc9817ctyperelationshipcreated2022-01-26T16:18:10.629Zidrelationship--9c206954-9225-4aba-9d18-80eee8a08382modified2022-01-26T16:18:10.629Zrelationship_typesubcontrol-ofsource_refcourse-of-action--58236e29-fc0e-45c8-838c-6a6775374976target_refcourse-of-action--cf53299c-d329-49f7-a425-e282fe6bb000typerelationshipcreated2022-01-26T16:18:10.630Zidrelationship--18a95fbc-df9e-48e9-bf31-3569e67aa069modified2022-01-26T16:18:10.630Zrelationship_typerelated-tosource_refcourse-of-action--833f17ec-7979-4bf5-8e76-b56a09c1db91target_refcourse-of-action--c5aa5e8a-eb48-4fd4-a0c0-b57a85e87b27typerelationshipcreated2022-01-26T16:18:10.631Zidrelationship--b0b852c9-4b31-45cb-a21e-c2767efe017dmodified2022-01-26T16:18:10.631Zrelationship_typerelated-tosource_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785target_refcourse-of-action--62e634b5-00b7-412b-9ae8-f33c6980426atyperelationshipcreated2022-01-26T16:18:10.632Zidrelationship--6c8009d4-9002-45ca-af29-411fe5556a9fmodified2022-01-26T16:18:10.632Zrelationship_typerelated-tosource_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785target_refcourse-of-action--e2b61956-3147-417d-82f6-3b79f4a76fcatyperelationshipcreated2022-01-26T16:18:10.633Zidrelationship--584aca57-a5a3-49ad-a520-78857b44c5dfmodified2022-01-26T16:18:10.633Zrelationship_typerelated-tosource_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785target_refcourse-of-action--116909fe-0005-4e32-a88b-1b0f6f66639btyperelationshipcreated2022-01-26T16:18:10.634Zidrelationship--fe08e567-8047-4a79-a40c-31b0aab296d4modified2022-01-26T16:18:10.634Zrelationship_typesubcontrol-ofsource_refcourse-of-action--ef869a03-dbf7-49b2-84de-a4d516d99d7etarget_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.635Zidrelationship--912aa359-b0ec-4a37-82a8-f336f6252c28modified2022-01-26T16:18:10.635Zrelationship_typesubcontrol-ofsource_refcourse-of-action--faa5e8ea-7838-4f46-9ac3-d5f03b39da68target_refcourse-of-action--90372cb6-fa24-4c3e-9612-12418db671eetyperelationshipcreated2022-01-26T16:18:10.636Zidrelationship--6ec24ced-4d8b-4341-b4a5-ad034f785623modified2022-01-26T16:18:10.636Zrelationship_typerelated-tosource_refcourse-of-action--c5aa5e8a-eb48-4fd4-a0c0-b57a85e87b27target_refcourse-of-action--833f17ec-7979-4bf5-8e76-b56a09c1db91typerelationshipcreated2022-01-26T16:18:10.637Zidrelationship--9cabf26d-7155-47b1-8d4b-c81870d6e73amodified2022-01-26T16:18:10.637Zrelationship_typesubcontrol-ofsource_refcourse-of-action--e9147ee3-29a5-476e-9d3d-de9502c999fctarget_refcourse-of-action--da9fac17-787d-4a47-bb20-361191a896eetyperelationshipcreated2022-01-26T16:18:10.638Zidrelationship--ea237155-03d0-45aa-a8d0-cdbfd2ac8eb9modified2022-01-26T16:18:10.638Zrelationship_typerelated-tosource_refcourse-of-action--6b4f930b-642e-46a3-ba5f-ae54ea544703target_refcourse-of-action--a2af383f-7caa-443e-8a66-95ab26ff4fc0typerelationshipcreated2022-01-26T16:18:10.639Zidrelationship--1b24396c-d1fa-4f6a-ad95-1bb79280b4b5modified2022-01-26T16:18:10.639Zrelationship_typesubcontrol-ofsource_refcourse-of-action--ed754187-4af2-4caa-804c-8addf126eab0target_refcourse-of-action--6b4f930b-642e-46a3-ba5f-ae54ea544703typerelationshipcreated2022-01-26T16:18:10.640Zidrelationship--e02e9010-4df7-4198-8228-67b34b892a0emodified2022-01-26T16:18:10.640Zrelationship_typerelated-tosource_refcourse-of-action--2bc46d02-f2ca-4634-bd3d-c3929a971f86target_refcourse-of-action--48ec2a5f-b53e-4116-96be-4e85d4949ee4typerelationshipcreated2022-01-26T16:18:10.641Zidrelationship--b009ae6c-a847-42a6-8303-dbc8eaf393d8modified2022-01-26T16:18:10.641Zrelationship_typesubcontrol-ofsource_refcourse-of-action--e21ca9a8-2b16-4485-af32-839367117db8target_refcourse-of-action--6faef0f7-07a5-4003-9e18-ba199845f352typerelationshipcreated2022-01-26T16:18:10.642Zidrelationship--3ad9ef93-697f-4b0e-b532-85caffe46d91modified2022-01-26T16:18:10.642Zrelationship_typerelated-tosource_refcourse-of-action--48ec2a5f-b53e-4116-96be-4e85d4949ee4target_refcourse-of-action--6e3c2c48-609e-448e-97ca-47064b552dbdtyperelationshipcreated2022-01-26T16:18:10.643Zidrelationship--4bb569dd-825c-4e5d-93a7-22c61e314111modified2022-01-26T16:18:10.643Zrelationship_typesubcontrol-ofsource_refcourse-of-action--6cac0cfb-86c1-4e4a-bceb-11efb0c5f0b1target_refcourse-of-action--15b37451-6320-47f1-a900-208c4dad20ddtyperelationshipcreated2022-01-26T16:18:10.644Zidrelationship--ebb014bc-fd56-4b51-8398-76170e7e9765modified2022-01-26T16:18:10.644Zrelationship_typerelated-tosource_refcourse-of-action--c4e54f15-16d6-43d9-b417-ff53cfcc868etarget_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.645Zidrelationship--65bff476-6c77-400d-b354-368903360555modified2022-01-26T16:18:10.645Zrelationship_typerelated-tosource_refcourse-of-action--ff43f213-8c20-4bb7-a12f-5d0de5432936target_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.646Zidrelationship--87c76285-91f9-405b-9762-5f20dce54dfemodified2022-01-26T16:18:10.646Zrelationship_typerelated-tosource_refcourse-of-action--4b4ac3bd-cc00-417f-9b18-4b0a5df165a4target_refcourse-of-action--15b37451-6320-47f1-a900-208c4dad20ddtyperelationshipcreated2022-01-26T16:18:10.647Zidrelationship--edb1a581-0280-408a-b256-a8e42ea71f8dmodified2022-01-26T16:18:10.647Zrelationship_typesubcontrol-ofsource_refcourse-of-action--a10fb231-9005-4282-91f0-c33f792502fftarget_refcourse-of-action--4b4ac3bd-cc00-417f-9b18-4b0a5df165a4typerelationshipcreated2022-01-26T16:18:10.648Zidrelationship--9aca91f0-6f00-44db-bd23-727072ab46bbmodified2022-01-26T16:18:10.648Zrelationship_typerelated-tosource_refcourse-of-action--f5dbe28d-4d5a-4318-b876-d084c60500d6target_refcourse-of-action--4968fd67-2fc5-440c-a75d-facfeb7ee057typerelationshipcreated2022-01-26T16:18:10.649Zidrelationship--45fac472-24f4-4459-b42f-28899aa4ef73modified2022-01-26T16:18:10.649Zrelationship_typerelated-tosource_refcourse-of-action--e56b83d3-575d-4c89-9716-b11a515eaaa3target_refcourse-of-action--e1d22f61-7bf3-4bd8-a6a0-ff33ad75d640typerelationshipcreated2022-01-26T16:18:10.650Zidrelationship--c698357a-82d5-4adb-80e3-5abeb4a0a637modified2022-01-26T16:18:10.650Zrelationship_typerelated-tosource_refcourse-of-action--c5d95e9e-6f5b-40f2-bc43-58fa4c2a6590target_refcourse-of-action--3cea233c-2b49-41ab-a7ed-c74aabec92e4typerelationshipcreated2022-01-26T16:18:10.651Zidrelationship--5790a361-b0e0-49f2-aac7-0c3b9abcd2a9modified2022-01-26T16:18:10.651Zrelationship_typerelated-tosource_refcourse-of-action--c17535df-3cb4-41ba-b0b9-e34637d2e234target_refcourse-of-action--15b37451-6320-47f1-a900-208c4dad20ddtyperelationshipcreated2022-01-26T16:18:10.652Zidrelationship--704da4f3-f123-4434-adda-23c0127524c1modified2022-01-26T16:18:10.652Zrelationship_typerelated-tosource_refcourse-of-action--1e0aa203-8217-4ddc-ae6f-a28821b09117target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.653Zidrelationship--9785e3e3-7f6e-4776-b709-bcdd1ceb3e67modified2022-01-26T16:18:10.653Zrelationship_typerelated-tosource_refcourse-of-action--efd97fa0-e314-4ff5-a883-47d9e7c63c31target_refcourse-of-action--56650028-e92d-44b9-9cbe-782fede4f57btyperelationshipcreated2022-01-26T16:18:10.654Zidrelationship--9f239c1c-231f-4447-9aab-19a8c3586e46modified2022-01-26T16:18:10.654Zrelationship_typerelated-tosource_refcourse-of-action--9721ab49-1a6b-456d-8917-c281e44e6b92target_refcourse-of-action--37408b6b-8521-459d-919d-73a3e1bf0e80typerelationshipcreated2022-01-26T16:18:10.655Zidrelationship--c5d34462-a223-4091-9135-3fe87bd9a620modified2022-01-26T16:18:10.655Zrelationship_typerelated-tosource_refcourse-of-action--ab76ebd6-7090-4d32-8510-dae49fe061c5target_refcourse-of-action--7b328b08-fdd6-4b98-b906-1620ccd14536typerelationshipcreated2022-01-26T16:18:10.656Zidrelationship--d7918d0b-21f8-4ef1-8bcf-753539cb6489modified2022-01-26T16:18:10.656Zrelationship_typerelated-tosource_refcourse-of-action--e939e84a-c8df-4fb2-9c51-817c93da50f3target_refcourse-of-action--833f17ec-7979-4bf5-8e76-b56a09c1db91typerelationshipcreated2022-01-26T16:18:10.657Zidrelationship--2f1d40c3-0ef5-455f-b738-0183194ea255modified2022-01-26T16:18:10.657Zrelationship_typerelated-tosource_refcourse-of-action--40a2afa1-74ba-4eaa-be42-3685b803196ctarget_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.658Zidrelationship--253538ad-c069-455f-8cd4-f10e865e7e3amodified2022-01-26T16:18:10.658Zrelationship_typerelated-tosource_refcourse-of-action--8dce3b4a-2851-470d-a1a6-35d5fa9cec90target_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.659Zidrelationship--7179e36c-581b-430c-a28e-7bde0008f323modified2022-01-26T16:18:10.659Zrelationship_typerelated-tosource_refcourse-of-action--bd589198-ecb6-4de4-afc1-2fa1e453271etarget_refcourse-of-action--c926efbd-81dc-46de-82f5-aab6324d7943typerelationshipcreated2022-01-26T16:18:10.660Zidrelationship--aee587ae-516f-42ff-9410-21a1825cfea3modified2022-01-26T16:18:10.660Zrelationship_typerelated-tosource_refcourse-of-action--ba70c039-b7c8-4e52-a4a1-67ec7976b32etarget_refcourse-of-action--735facd3-04a2-4f20-a943-3fdb354c562ctyperelationshipcreated2022-01-26T16:18:10.661Zidrelationship--1b9fed41-46fc-4dc4-b829-c09c2ba0722bmodified2022-01-26T16:18:10.661Zrelationship_typerelated-tosource_refcourse-of-action--bdb243c2-cb1b-4dfb-9277-1a68123017c2target_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.662Zidrelationship--f1f69d1e-d67b-4a00-81aa-7a9e76b5013cmodified2022-01-26T16:18:10.662Zrelationship_typerelated-tosource_refcourse-of-action--622c311f-51f5-4ed8-aa89-797ec4a6ae2atarget_refcourse-of-action--10b1d0f1-617c-4a21-b67e-a17fa12c44d3typerelationshipcreated2022-01-26T16:18:10.663Zidrelationship--6b220767-f9bb-40b1-a74b-0466755b3634modified2022-01-26T16:18:10.663Zrelationship_typerelated-tosource_refcourse-of-action--622c311f-51f5-4ed8-aa89-797ec4a6ae2atarget_refcourse-of-action--ba70c039-b7c8-4e52-a4a1-67ec7976b32etyperelationshipcreated2022-01-26T16:18:10.664Zidrelationship--09e5a989-f432-4146-afe0-cc6aa9b33c19modified2022-01-26T16:18:10.664Zrelationship_typerelated-tosource_refcourse-of-action--1d790fb8-22b0-49ab-bf5c-87b48eef88a8target_refcourse-of-action--d60f315c-552e-4aa8-b79e-6a37b96031d0typerelationshipcreated2022-01-26T16:18:10.665Zidrelationship--7902546f-d72f-49d3-928a-9b79d4970831modified2022-01-26T16:18:10.665Zrelationship_typerelated-tosource_refcourse-of-action--1ab503d7-916e-4b28-9467-baadfafcdc01target_refcourse-of-action--2082d490-b34b-414b-9138-962ea7993e75typerelationshipcreated2022-01-26T16:18:10.666Zidrelationship--dcdc3b40-e4e4-48cf-98e3-048ba3a02e58modified2022-01-26T16:18:10.666Zrelationship_typerelated-tosource_refcourse-of-action--5f6f38fb-ce25-4efd-9349-d6c100f6038ctarget_refcourse-of-action--06197425-0f92-40ce-9742-3ef7a9c17785typerelationshipcreated2022-01-26T16:18:10.667Zidrelationship--a2c64585-3505-42e0-bd40-4f01e07c7110modified2022-01-26T16:18:10.667Zrelationship_typerelated-tosource_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtarget_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.668Zidrelationship--9ea8bea4-b33d-421a-bf12-6f772aecd0abmodified2022-01-26T16:18:10.668Zrelationship_typerelated-tosource_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtarget_refcourse-of-action--4063f391-fa2d-4a03-bede-404b65045f4ctyperelationshipcreated2022-01-26T16:18:10.669Zidrelationship--b7df2a75-f21c-4c6c-9a05-c6766caaa957modified2022-01-26T16:18:10.669Zrelationship_typerelated-tosource_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtarget_refcourse-of-action--323be88c-9ad9-49b2-b3b2-85efabdb19eetyperelationshipcreated2022-01-26T16:18:10.670Zidrelationship--395d2573-9412-4b09-8bf1-61bc9749e40dmodified2022-01-26T16:18:10.670Zrelationship_typerelated-tosource_refcourse-of-action--c1202f53-f149-49ff-844b-aa24179c18aetarget_refcourse-of-action--b5dc398f-4968-4f23-852a-50f67a30eddetyperelationshipcreated2022-01-26T16:18:10.671Zidrelationship--6ceef41a-312a-438d-93c9-4c221e8ac74dmodified2022-01-26T16:18:10.671Zrelationship_typesubcontrol-ofsource_refcourse-of-action--9e373981-82bc-4d1c-a8c1-6b279408a3e8target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.672Zidrelationship--6eabce8a-d184-49ef-90e1-211753f5c3b0modified2022-01-26T16:18:10.672Zrelationship_typesubcontrol-ofsource_refcourse-of-action--16b0ce0b-0ccc-4404-8d7a-42ebaae4199dtarget_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.673Zidrelationship--b58af3b4-8ac3-4320-9abb-e5dbe914898bmodified2022-01-26T16:18:10.673Zrelationship_typesubcontrol-ofsource_refcourse-of-action--e6b659ba-8396-497f-b4b3-c0ca25aef8f5target_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.674Zidrelationship--5ac83848-07db-4511-ac0f-4db7afeb947fmodified2022-01-26T16:18:10.674Zrelationship_typerelated-tosource_refcourse-of-action--1bb1b212-a29f-47f9-a803-3cb7e95ebdeatarget_refcourse-of-action--aa1ec496-0352-4e25-8c98-e842a21bbafftyperelationshipcreated2022-01-26T16:18:10.675Zidrelationship--b5ae38a2-fba0-4df7-8696-8704b1fcce17modified2022-01-26T16:18:10.675Zrelationship_typerelated-tosource_refcourse-of-action--e2ba3f0f-62b9-4fc7-bc83-f85cf4281d0ftarget_refcourse-of-action--04bc94ad-08ca-46aa-8dfd-4b4b017682b4typerelationshipcreated2022-01-26T16:18:10.676Zidrelationship--77d192a7-3256-4fff-b0b5-a6929bb40633modified2022-01-26T16:18:10.676Zrelationship_typerelated-tosource_refcourse-of-action--36001064-21b8-4794-9f6c-38d932547ca7target_refcourse-of-action--f3243d26-a960-4e0e-a681-8402ba8b8674typerelationshipcreated2022-01-26T16:18:10.677Zidrelationship--931127f4-d7ef-4eee-a49b-753d0973a831modified2022-01-26T16:18:10.677Zrelationship_typerelated-tosource_refcourse-of-action--c747733c-18b6-43ec-92c8-9d970b4888d9target_refcourse-of-action--b8301f5c-f6e1-4979-938a-d482ccf0c3f7typerelationshipcreated2022-01-26T16:18:10.678Zidrelationship--f8157dc9-e902-492c-92e9-a85a43be2100modified2022-01-26T16:18:10.678Zrelationship_typesubcontrol-ofsource_refcourse-of-action--92cda502-0461-45bc-947d-cf8dd870357ftarget_refcourse-of-action--323be88c-9ad9-49b2-b3b2-85efabdb19eetyperelationshipcreated2022-01-26T16:18:10.679Zidrelationship--edddc0fb-874d-4d12-9d0d-baab1d4e6fedmodified2022-01-26T16:18:10.679Zrelationship_typerelated-tosource_refcourse-of-action--24c0c149-e872-4ac0-8ff3-8abab0e96349target_refcourse-of-action--bc169b9a-1d81-4139-8db6-93b256da7068typerelationshipcreated2022-01-26T16:18:10.680Zidrelationship--1b356be6-6d07-4b10-b025-e470d5d38cfbmodified2022-01-26T16:18:10.680Zrelationship_typesubcontrol-ofsource_refcourse-of-action--47d93165-cf72-4dce-a2ff-675030037ef9target_refcourse-of-action--323be88c-9ad9-49b2-b3b2-85efabdb19eetyperelationshipcreated2022-01-26T16:18:10.681Zidrelationship--a8c14ddf-61b0-42ca-a638-314c54f2d371modified2022-01-26T16:18:10.681Zrelationship_typerelated-tosource_refcourse-of-action--d60f315c-552e-4aa8-b79e-6a37b96031d0target_refcourse-of-action--4adf4bad-a25a-42a1-a0b2-66f03965f489typerelationshipcreated2022-01-26T16:18:10.682Zidrelationship--bce1bbbb-c0dd-4205-8e2a-f4fb4c0868afmodified2022-01-26T16:18:10.682Zrelationship_typesubcontrol-ofsource_refcourse-of-action--3cafcbf3-6b76-4e24-adcb-bfabee9e1ef6target_refcourse-of-action--d60f315c-552e-4aa8-b79e-6a37b96031d0typerelationshipcreated2022-01-26T16:18:10.683Zidrelationship--6c9ac4b0-b80b-4d16-bc3f-ab74e2a58eb1modified2022-01-26T16:18:10.683Zrelationship_typerelated-tosource_refcourse-of-action--e551d16e-0964-4a06-868e-832be998bb56target_refcourse-of-action--26855edc-e103-4d24-9ac9-c55593af4304typerelationshipcreated2022-01-26T16:18:10.684Zidrelationship--ff2c0a46-9e6e-4cc7-8cf2-95244a6dd01amodified2022-01-26T16:18:10.684Zrelationship_typerelated-tosource_refcourse-of-action--2545b1fa-c19e-4931-9a37-bda32ee76e66target_refcourse-of-action--898107b9-7127-4996-9bf7-881b97b13b26typerelationshipcreated2022-01-26T16:18:10.685Zidrelationship--093472c1-4d80-4156-83ef-fb5339cbbe9emodified2022-01-26T16:18:10.685Zrelationship_typesubcontrol-ofsource_refcourse-of-action--3d281ae5-5aea-4681-86c4-b6d237f9ac9btarget_refcourse-of-action--525a3c24-5f2e-40d5-868f-d21e58098ccbtyperelationshipcreated2022-01-26T16:18:10.686Zidrelationship--15dbaea3-7d42-4c8a-81c9-cd10e03d6c8amodified2022-01-26T16:18:10.686Zrelationship_typerelated-tosource_refcourse-of-action--9ee8e5a2-67ff-4b88-b27f-9afe4e9c567atarget_refcourse-of-action--265141ac-f03a-4946-b34c-8de47acfcf4dtyperelationshipcreated2022-01-26T16:18:10.687Zidrelationship--7497ffe2-0fe2-466b-a443-3b128c73d58dmodified2022-01-26T16:18:10.687Zrelationship_typerelated-tosource_refcourse-of-action--776ed987-903b-4026-8d95-150881c4bc0etarget_refcourse-of-action--1fcf5db7-36f2-40cb-93f7-5444d8242669typerelationshipcreated2022-01-26T16:18:10.688Zidrelationship--67c7df11-97be-4dec-935a-8b04bb9398dfmodified2022-01-26T16:18:10.688Zrelationship_typerelated-tosource_refcourse-of-action--bedc506d-a5d9-401f-b612-aac641b40116target_refcourse-of-action--378b89e7-6d39-4942-82e8-8317949858eatyperelationshipcreated2022-01-26T16:18:10.689Zidrelationship--9d8887ed-b6e1-45ef-b8d7-c5ba04c5a137modified2022-01-26T16:18:10.689Zrelationship_typerelated-tosource_refcourse-of-action--c9d64752-027f-4a1f-866d-af6d52941e84target_refcourse-of-action--bedc506d-a5d9-401f-b612-aac641b40116typerelationshipcreated2022-01-26T16:18:10.690Zidrelationship--9b9f0af5-7e73-41a8-8ddd-26ec8ee12306modified2022-01-26T16:18:10.690Zrelationship_typerelated-tosource_refcourse-of-action--e48d90a4-d33d-40ab-a2d7-f06bd8fca9dftarget_refcourse-of-action--bc169b9a-1d81-4139-8db6-93b256da7068typerelationshipcreated2022-01-26T16:18:10.691Zidrelationship--06cf0abb-4797-47ad-a8d7-2773055abfdamodified2022-01-26T16:18:10.691Zrelationship_typerelated-tosource_refcourse-of-action--e48d90a4-d33d-40ab-a2d7-f06bd8fca9dftarget_refcourse-of-action--258702dc-b79d-4554-9b4d-57cff98cfa17typerelationshipcreated2022-01-26T16:18:10.692Zidrelationship--cffe70e7-ef82-49ec-bffb-25144968bf98modified2022-01-26T16:18:10.692Zrelationship_typerelated-tosource_refcourse-of-action--e48d90a4-d33d-40ab-a2d7-f06bd8fca9dftarget_refcourse-of-action--aa74d092-aaa5-4724-befe-a26f999d646dtyperelationshipcreated2022-01-26T16:18:10.693Zidrelationship--35af73b1-d061-4b53-96a0-b5beef47e545modified2022-01-26T16:18:10.693Zrelationship_typerelated-tosource_refcourse-of-action--95132e7d-181a-4498-818e-b82d66376f90target_refcourse-of-action--b2828bb6-102b-4f0a-b368-b183a1943f1atyperelationshipcreated2022-01-26T16:18:10.694Zidrelationship--e2fe2895-750f-4a73-90c6-692c372b728emodified2022-01-26T16:18:10.694Zrelationship_typerelated-tosource_refcourse-of-action--99a68447-6410-48ca-b475-855151f85317target_refcourse-of-action--99a68447-6410-48ca-b475-855151f85317typerelationship