Creator
Description
Identify inherited controls provided by outsourced DCO providers. Step 6 of the RMF process, continuous monitoring, is supported through monitoring and detection capabilities provided under DCO requirements. A Defense in Depth strategy that accounts for monitoring and detection at the perimeter, network, endpoint, and data levels should be identified and tested for measures of effectiveness and measures of performance.Owning Diagram A12: Prepare for Phase 3 & 4 DT&E