STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

CA-6

Assessment, Authorization, and MonitoringRev 5organization

Authorization

Baselines:LowModerateHighPrivacy

Control Statement

a. Assign a senior official as the authorizing official for the system; b. Assign a senior official as the authorizing official for common controls available for inheritance by organizational systems; c. Ensure that the authorizing official for the system, before commencing operations: 1. Accepts the use of common controls inherited by the system; and 2. Authorizes the system to operate; d. Ensure that the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems; e. Update the authorizations [Assignment: frequency].

Supplemental Guidance

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon controls. Authorizing officials provide budgetary oversight for organizational systems and common controls or assume responsibility for the mission and business functions supported by those systems or common controls. The authorization process is a federal responsibility, and therefore, authorizing officials must be federal employees. Authorizing officials are both responsible and accountable for security and privacy risks associated with the operation and use of organizational systems. Nonfederal organizations may have similar processes to authorize systems and senior officials that assume the authorization role and associated responsibilities. Authorizing officials issue ongoing authorizations of systems based on evidence produced from implemented continuous monitoring programs. Robust continuous monitoring programs reduce the need for separate reauthorization processes. Through the employment of comprehensive continuous monitoring processes, the information contained in authorization packages (i.e., security and privacy plans, assessment reports, and plans of action and milestones) is updated on an ongoing basis. This provides authorizing officials, common control providers, and system owners with an up-to-date status of the security and privacy posture of their systems, controls, and operating environments. To reduce the cost of reauthorization, authorizing officials can leverage the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.

Related Controls (8)

CA-2CA-3CA-7PM-9PM-10RA-3SA-10SI-12

CCI Identifiers (7)

CCI-000270Assign a senior official as the authorizing official for the system.CCI-000271Ensure the authorizing official for the system authorizes the system to operate before commencing operations.CCI-000272Update the authorization on an organization-defined frequency.CCI-000273Defines the frequency with which to update the authorizations.CCI-003868Assign a senior official as the authorizing official for common controls available for inheritance by organizational systems.CCI-003869Ensure the authorizing official accepts the use of common controls inherited by the system, before commencing operations.CCI-003870Ensure that the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems.

Linked STIG Checks (0)

No STIG checks reference this control.