Skip to main content

Cybersecurity Shared Responsibility Model

Overview

Our Cybersecurity Shared Responsibility Model is designed in the methods we have built for the Istari Digital application within Amazon Web Services (AWS) and ensures we have a comprehensive approach to security and compliance. The below Shared Responsibility Model is divided into three control categories:

  • Inherited (Istari Digital or AWS)
  • Customer
  • Hybrid

The controls below serve as an initiating point for shared responsibility discussions and may need to be adjusted based on the customer’s cybersecurity requirements. Istari Digital will consistently review these controls and if the status of the Shared Responsibility changes, the customer will be notified.

The Cybersecurity Shared Responsibility Model control answers are provided under the Cybersecurity Maturity Model Certification (CMMC) Level 2 process for processing Controlled Unclassified Information (CUI) and International Traffic in Arms Regulations (ITAR) data. There are 110 applicable controls under CMMC Level 2. Reference Figure 1 below for a breakout of control inheritance percentages.

Shared Responsibility Model Percentage Breakdown
Figure 1 – Shared Responsibility Model Percentage Breakdown

Istari Digital & AWS Inherited Controls

These are security controls that customers inherit from the application and from our AWS deployments. Inherited controls include infrastructure and foundational services such as physical security, environmental controls, and the security of the hardware and software that powers cloud services. Customers benefit from these controls without direct action, as they are embedded in the service provided by Istari Digital.

DomainControlControl TitleImplementation ResponsibilityImplementation Narrative
ACAC.L2-3.1.9Privacy & Security NoticesIstari DigitalThe Istari Digital Platform provides appropriate banners consistent with the requirements of this control.
CMCM.L2-3.4.1System BaseliningIstari DigitalThe Istari Digital Platform contains multiple types of systems including Virtual Machines (VM), containerized systems, and other software/tools required for platform operations.
CMCM.L2-3.4.2Security Configuration EnforcementIstari DigitalIstari Digital maintains configuration documentation and security scans of our systems. If alternative software or images are used consistent with the customer's requirements, additional configuration may be required for functionality or security.
IAIA.L2-3.5.5Identifier ReuseIstari DigitalThe Istari Digital Platform requires users and processes within its boundary to have unique identifiers.
IAIA.L2-3.5.10Cryptographically Protected PasswordsIstari DigitalThe Istari Digital Platform obscures passwords.
IAIA.L2-3.5.11Obscure FeedbackIstari DigitalThe Istari Digital Platform obscures feedback for unauthorized login attempts.
MAMA.L2-3.7.1Perform MaintenanceAWSInherited by AWS.
MAMA.L2-3.7.2System Maintenance ControlAWS
MAMA.L2-3.7.3Equipment SanitizationAWS
MAMA.L2-3.7.4Media InspectionAWS
MAMA.L2-3.7.5Nonlocal MaintenanceAWS
MAMA.L2-3.7.6Maintenance PersonnelAWS
MPMP.L2-3.8.1Media ProtectionAWSInherited by AWS.
MPMP.L2-3.8.2Media AccessAWS
MPMP.L1-3.8.3Media DisposalAWS
MPMP.L2-3.8.4Media MarkingsAWS
MPMP.L2-3.8.5Media AccountabilityAWS
MPMP.L2-3.8.6Portable Storage EncryptionAWS
MPMP.L2-3.8.7Removable MediaAWS
MPMP.L2-3.8.8Shared MediaAWS
MPMP.L2-3.8.9Protect BackupsAWS
PEPE.L1-3.10.1Limit Physical AccessAWSAWS Inherited by AWS.
PEPE.L2-3.10.2Monitor FacilityAWS
PEPE.L1-3.10.3Escort VisitorsAWS
PEPE.L1-3.10.4Physical Access LogsAWS
PEPE.L1-3.10.5Manage Physical AccessAWS
PEPE.L2-3.10.6Alternative Work SitesAWS
SCSC.L2-3.13.2Security EngineeringIstari DigitalIstari Digital manages the software development lifecycle pipelines which includes various security controls and tests that are implemented.

Hybrid Controls

Hybrid controls involve shared responsibilities. These controls require a combination of approaches between Istari Digital and the tenant customer to implement specific aspects of the security control. For example, while Istari Digital may enable authentication features of the application, the customer may be responsible for assuring notification processes for when a user needs to be deleted or disabled. Hybrid controls involve network security configurations, encryption key management, and operating system patches and updates for the host infrastructure.

DomainControlControl TitleImplementation StatusImplementation Narrative
ACAC.L1-3.1.1Authorized Access ControlHybridThe Istari Digital Platform implements identity and access management controls using Zitadel (Identity) and Spice DB (Authorization) locally to the Control Plane. These controls are appropriately handled through role-based controls that can be incrementally adjusted per model within the platform. Identification of access procedures to the platform and the environment it resides will need to be documented for the platform in conjunction with a System Security Plan (SSP) to meet the threshold of this control.
ACAC.L2-3.1.3Control CUI FlowHybridThe Istari Digital Platform restricts system services from accessing data in a manner that could potentially expose the protected models. With the use of single use/signed URLs and various encryption methods, protected models can only be accessed by approved tools and services within the Data Plane. This is also limited to authorized end users of the platform.
ACAC.L2-3.1.10Session LockHybridIstari Digital requires and enforces automated session locks on all employee devices before granting access to protected systems. The customer is responsible for adjusting the control settings within their own systems.
ATAT.L2-3.2.1Role-based Risk AwarenessHybridRecommendations for this control include all Defense and Industrial Base and Government users completing the following training or equivalent prior to receiving access to the Istari Digital Platform Environment. 1) Security Awareness 2) CUI 3) Insider Threat While Istari Digital maintains its own acceptable use and training policy consistent with the above recommendations, the customer is responsible for controlling access and maintaining training requirements.
ATAT.L2-3.2.2Role-based TrainingHybridIn addition to the recommendation of AT.L2-3.2.1, privileged users with access to the Istari Digital Platform or the environment in which the platform is housed must complete specific security and compliance training suitable for their roles.
ATAT.L2-3.2.3Insider Threat AwarenessHybridThe recommendation for this training is included with the Implementation Narrative of AT.L2-3.2.1.
CMCM.L2-3.4.6Least FunctionalityHybridIstari Digital continually ensures that native systems and services operate with only the minimum functionality required to effectively complete authorized and necessary actions. Additional configurations may be required based on requirements of the customer environment to limit nonessential actions and enforce the principle of least privilege.
CMCM.L2-3.4.7Nonessential FunctionalityHybrid
CMCM.L2-3.4.8Application Execution PolicyHybrid
IAIA.L1-3.5.1IdentificationHybridThe Istari Platform implements identity and access management controls using Zitadel.
IAIA.L1-3.5.2AuthenticationHybridThe Istari Digital Platform supports the use of Multi-Factor Authentication (MFA).  
IAIA.L2-3.5.3Multifactor AuthenticationHybrid
IAIA.L2-3.5.4Replay-Resistant AuthenticationHybridAuthentication is handled with a combination of a single use session token and the credentialing hash. Both components are required for an authenticated request.
IRIR-L2-3.6.1Incident HandlingHybridIstari Digital has established an operational incident-handling capability for its systems, which includes preparation, analysis, containment, and recovery activities. We also identify vulnerabilities in the software development pipeline and communicate any appropriate patches. The customer's responsibility will lie within responding to their environment, tracking, documenting, reporting incidents internally, and communicating them between organizations if necessary.
IRIR-L2-3.6.2Incident ReportingHybrid
IRIR-L2-3.6.3Incident Response TestingHybrid
PSPS.L2-3.9.1Screen IndividualsHybridIstari Digital currently implements an onboarding/offboarding system that includes personnel screening, background checks and certification of appropriate citizenship status. This is maintained for as long as access is required. Istari Digital customers are responsible for implementing their own process to screen individuals that have access to the Istari Platform.
PSPS.L2-3.9.2Personnel ActionsHybrid
SCSC.L2-3.13.3Role SeparationHybridIstari Digital has configured the platform for user functionality and system management to be identified through two different authentication pipelines. Istari Digital customers are responsible for implementing their user base to utilize those mechanisms.
SCSC.L2-3.13.4Shared Resource ControlHybridThe Istari Digital Platform has several protections within its internal boundary. Additional protections are leveraged using separate VPCs for the Data and Control Planes.
SCSC.L2-3.13.8Data in TransitHybridData is encrypted in Transit using appropriate cryptography IAW FIP 140-3.
SCSC.L2-3.13.11CUI EncryptionHybridCryptography is leveraged throughout the Istari Digital Platform to maintain confidentiality of the system.
SCSC.L2-3.13.13Mobile CodeHybridThe Istari Digital Platform leverages customer infrastructure to enable digital threading. Customers are responsible for configuration of their infrastructure to limit the use of mobile code.
SCSC.L2-3.13.15Communications AuthenticityHybridSession management is implemented through multiple controls including Zitadel Reauthentication and Secure Sockets Layer (SSL).
SCSC.L2-3.13.16Data at RestHybridThe Istari Digital Platform supports Data at Rest Encryption. The customer is responsible for ensuring organizational key management is in place to leverage this capability.
SISI-L1-3.14.1Flaw RemediationHybridIstari Digital conducts periodic risk and vulnerability assessments as a part of its software development lifecycle. If a vulnerability is identified, an appropriate notification will be provided to all relevant stakeholders in a timely manner to inform decision of risk. Environment monitoring of other software and tools will also need to be conducted.
SISI-L1-3.14.2Malicious Code ProtectionCustomerIstari Digital maintains malicious code protection within the backend of the platform. Customers are responsible for ensuring their systems have the same protection and that the data they process through the Istari Platform is safe.
SISI-L2-3.14.3Security Alerts & AdvisoriesCustomerIstari Digital does receive security alerts and advisories as is appropriate to its operations. If Istari Digital software is affected appropriate notification pipelines will be initiated and the customer will be informed as necessary.
SISI-L1-3.14.4Update Malicious Code ProtectionCustomerIstari Digital maintains malicious code protection within the backend of the platform. Customers are responsible for ensuring their systems have the same protection and that the data they process through the Istari Platform is safe.
SISI-L1-3.14.5System & File ScanningCustomer
SISI-L2-3.14.6Monitor Communications for AttacksCustomerIstari Digital has a comprehensive monitoring program in the environment.
SISI-L2-3.14.7Identify Unauthorized UseCustomer

Customer Controls

The remaining controls for CMMC are entirely client responsibility. They include securing customer data, customer tenant environments, client-side data encryption and integrity, and the security of customer-created or managed applications. The customer must implement these controls to ensure their data is appropriately protected.

DomainControlControl TitleImplementation StatusImplementation Narrative
ACAC.L1-3.1.2Transaction & Function ControlCustomerThe customer is responsible for who has access to the actions and data that will be processed through the Istari Platform.
ACAC.L2-3.1.4Separation of DutiesCustomerSeparation of duties and least privilege will need to be configured in multiple places within the environment during the deployment process. Primary Considerations for this control include IAM (AWS) and administrative accounts in the VMs.      
ACAC.L2-3.1.5Least PrivilegeCustomer
ACAC.L2-3.1.6Non-Privilege Account UseCustomer
ACAC.L2-3.1.7Privileged FunctionsCustomer
ACAC.L2-3.1.8Unsuccessful Logon AttemptsCustomerThrough Zitadel the Istari Digital Platform can integrate with various identity providers, through which unsuccessful logon attempts will be handled and may require some configuration to meet this threshold.
ACAC.L2-3.1.11Session TerminationCustomerThis can be configured in multiple places in the environment. On existing deployments, Istari Digital has implemented this in a Virtual Private Network (VPN), the Customer identity and access management (CIAM) supported by Zitadel, and the Identity and Access Management (IAM) supported by AWS.
ACAC.L2-3.1.12Control Remote AccessCustomerRemote connections will need to be managed in a way to prevent when communicating with external systems. Istari Digital has implemented this control through the use of a VPN (Pritunl) in current deployments; however, customers retain the flexibility to choose their preferred VPN.
ACAC.L2-3.1.13Remote Access ConfidentialityCustomer
ACAC.L2-3.1.14Remote Access RoutingCustomer
ACAC.L2-3.1.15Privileged Remote AccessCustomer
ACAC.L2-3.1.16Wireless Access AuthorizationCustomerNo wireless access points exist within the defined system boundary.
ACAC.L2-3.1.17Wireless Access ProtectionCustomerNo wireless access points exist within the defined system boundary.
ACAC.L2-3.1.18Mobile Device ConnectionCustomerNo mobile devices exist within the defined system boundary.
ACAC.L2-3.1.19Encrypt CUI on mobileCustomerNo mobile devices exist within the defined system boundary.
ACAC.L2-3.1.20External ConnectionsCustomerNo external dependencies exist within the defined system boundary.
ACAC.L2-3.1.21Portable Storage UseCustomerNo portable storage devices exist within the defined system boundary.
ACAC.L2-3.1.22Control Public InformationCustomerNo public facing access points exist within the defined system boundary.
AUAU-L2-3.3.1System AuditingCustomerIstari Digital will support the aggregation of logs with platform features that allow capturing audit records at various levels of abstraction, including details such as timestamps, event descriptions, user identifiers, and other necessary event details. Maintenance and review of the logs will need to be maintained to further support compliance in this area.                
AUAU-L2-3.3.2User AccountabilityCustomer
AUAU-L2-3.3.3Event ReviewCustomer
AUAU-L2-3.3.4Audit Failure AlertingCustomer
AUAU-L2-3.3.5Audit CorrelationCustomer
AUAU-L2-3.3.6Reduction & ReportingCustomer
AUAU-L2-3.3.7Authoritative Time SourceCustomer
AUAU-L2-3.3.8Audit ProtectionCustomer
AUAU-L2-3.3.9Audit ManagementCustomer
CACA.L2-3.12.1Security Control AssessmentCustomerPeriodic assessment will need to occur on the environment, ensuring awareness of the defined security requirements and that your systems operate in environments that complement our security controls. Additionally, the system security plans, reports, and maintenance will need to be updated, addressing any highlighted weaknesses or vulnerabilities for platform environments.
CACA.L2-3.12.2Plan of Action and MilestonesCustomer
CACA.L2-3.12.3Security Control MonitoringCustomer
CACA.L2-3.12.4System Security PlanCustomer
CMCM.L2-3.4.3System Change ManagementCustomerIstari Digital offers documentation on platform and configuration updates, facilitating informed approval for system changes.      
CMCM.L2-3.4.4Security Impact AnalysisCustomer
CMCM.L2-3.4.5Access Restrictions for ChangeCustomer
CMCM.L2-3.4.9User-Installed SoftwareCustomer
IAIA.L2-3.5.6Identifier HandlingCustomerThe Istari Digital Platform supports the use of an external identity provider. This functionality will need to be configured either with the external provider or another tool.
IAIA.L2-3.5.7Password ComplexityCustomerThe Istari Digital Platform supports the use of an external identity provider. This functionality will need to be configured either with the external provider or another tool.
IAIA.L2-3.5.8Password ReuseCustomerThe Istari Digital Platform supports the use of an external identity provider. This functionality will need to be configured either with the external provider or another tool.
IAIA.L2-3.5.9Temporary PasswordsCustomerThe Istari Digital Platform supports the use of temporary passwords for the purposes of account creation.
RARA.L2-3.11.1Risk AssessmentsCustomerIstari Digital conducts periodic risk assessments as a part of its software development lifecycle. If a vulnerability is identified, an appropriate notification will be provided to all relevant stakeholders to inform the decision of risk. Risk assessment will need to be conducted periodically on the environment, including any relevant scanning of the environment.  
RARA.L2-3.11.2Vulnerability ScanCustomer
RARA.L2-3.11.3Vulnerability RemediationCustomer
SCSC.L1-3.13.1Boundary ProtectionCustomerBoundary protections and configurations will need to occur to appropriately protect the environment.
SCSC.L1-3.13.5Public-Access System SeparationCustomerNo public access points exist within the defined system boundary.
SCSC.L2-3.13.6Network Communication by ExceptionCustomerConfiguration of the environment will be required to implement these boundary protections.
SCSC.L2-3.13.7Split TunnelingCustomer
SCSC.L2-3.13.9Connections TerminationCustomerConfiguration to support this control will be required.
SCSC.L2-3.13.10Key ManagementCustomerA service such as Key Management Service (KMS) will need to be actively used to maintain keys to support compliant cryptography.
SCSC.L2-3.13.12Collaborative Device ControlCustomerNo collaborative computing devices exist within the defined system boundary.
SCSC.L2-3.13.14Voice over Internet Protocol (VoIP)CustomerNo VoIP devices exist within the defined system boundary.