STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

CA-7

Assessment, Authorization, and MonitoringRev 5organization

Continuous Monitoring

Baselines:LowModerateHighPrivacy

Control Statement

Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes:

Supplemental Guidance

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms "continuous" and "ongoing" imply that organizations assess and monitor their controls and risks at a frequency sufficient to support risk-based decisions. Different types of controls may require different monitoring frequencies. The results of continuous monitoring generate risk response actions by organizations. When monitoring the effectiveness of multiple controls that have been grouped into capabilities, a root-cause analysis may be needed to determine the specific control that has failed. Continuous monitoring programs allow organizations to maintain the authorizations of systems and common controls in highly dynamic environments of operation with changing mission and business needs, threats, vulnerabilities, and technologies. Having access to security and privacy information on a continuing basis through reports and dashboards gives organizational officials the ability to make effective and timely risk management decisions, including ongoing authorization decisions. Automation supports more frequent updates to hardware, software, and firmware inventories, authorization packages, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of systems. Monitoring requirements, including the need for specific monitoring, may be referenced in other controls and control enhancements, such as [AC-2g](#ac-2_smt.g), [AC-2(7)](#ac-2.7), [AC-2(12)(a)](#ac-2.12_smt.a), [AC-2(7)(b)](#ac-2.7_smt.b), [AC-2(7)(c)](#ac-2.7_smt.c), [AC-17(1)](#ac-17.1), [AT-4a](#at-4_smt.a), [AU-13](#au-13), [AU-13(1)](#au-13.1), [AU-13(2)](#au-13.2), [CM-3f](#cm-3_smt.f), [CM-6d](#cm-6_smt.d), [CM-11c](#cm-11_smt.c), [IR-5](#ir-5), [MA-2b](#ma-2_smt.b), [MA-3a](#ma-3_smt.a), [MA-4a](#ma-4_smt.a), [PE-3d](#pe-3_smt.d), [PE-6](#pe-6), [PE-14b](#pe-14_smt.b), [PE-16](#pe-16), [PE-20](#pe-20), [PM-6](#pm-6), [PM-23](#pm-23), [PM-31](#pm-31), [PS-7e](#ps-7_smt.e), [SA-9c](#sa-9_smt.c), [SR-4](#sr-4), [SC-5(3)(b)](#sc-5.3_smt.b), [SC-7a](#sc-7_smt.a), [SC-7(24)(b)](#sc-7.24_smt.b), [SC-18b](#sc-18_smt.b), [SC-43b](#sc-43_smt.b) , and [SI-4](#si-4).

Related Controls (51)

AC-2AC-6AC-17AT-4AU-6AU-13CA-2CA-5CA-6CM-3CM-4CM-6CM-11IA-5IR-5MA-2MA-3MA-4PE-3PE-6PE-14

CCI Identifiers (23)

CCI-002087Establish organization-defined system-level metrics to be monitored.CCI-001581The organization defines personnel or roles to whom the security status of the organization and the information system should be reported.CCI-000274Develop a continuous monitoring strategy.CCI-000275The organization implements a continuous monitoring program that includes a configuration management process for the information system.CCI-000276The organization implements a continuous monitoring program that includes a configuration management process for the information system constituent components.CCI-000277The organization implements a continuous monitoring program that includes a determination of the security impact of changes to the information system.CCI-000278The organization implements a continuous monitoring program that includes a determination of the security impact of changes to the environment of operation.CCI-000279Implement ongoing control assessments in accordance with the continuous monitoring strategy.

Linked STIG Checks (0)

No STIG checks reference this control.

PE-16
PE-20
PL-2
PM-4
PM-6
PM-9
PM-10
PM-12
PM-14
PM-23
PM-28
PM-31
PS-7
PT-7
RA-3
RA-5
RA-7
RA-10
SA-8
SA-9
SA-11
SC-5
SC-7
SC-18
SC-38
SC-43
SI-3
SI-4
SI-12
SR-6
CCI-000280Implement a continuous monitoring program that includes reporting the security status to organization-defined personnel or roles on an organization-defined frequency.
CCI-000281Defines the frequency with which to report the security status to organization-defined personnel or roles.
CCI-003880Defines the frequency with which to report the privacy status to organization-defined personnel or roles.
CCI-002089The organization establishes and defines the frequencies for assessments supporting continuous monitoring.
CCI-002090Implement ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy.
CCI-002091Implement a continuous monitoring program that includes correlation and analysis of information generated by assessments and monitoring.
CCI-002088Establish organization-defined frequencies for monitoring.
CCI-002092Implement a continuous monitoring program that includes response actions to address results of the analysis of control assessment and monitoring information.
CCI-003876Defines the frequencies for monitoring of control effectiveness.
CCI-003873Implement continuous monitoring in accordance with the organization-level continuous monitoring strategy.
CCI-003875Establish organization-defined frequencies for assessment of control effectiveness.
CCI-003877Defines the frequencies for assessment of control effectiveness.
CCI-003878Develop ongoing control assessments in accordance with the continuous monitoring strategy.
CCI-003879Implement a continuous monitoring program that includes reporting the privacy status to organization-defined personnel or roles on an organization-defined frequency.
CCI-003874Defines the system-level metrics to be monitored.