Telecommunications Services

The Telecommunications Services requirement (NIST SP 800-53 Rev. 5 CP-8) means you must pre-arrange alternate telecom pathways (carriers, circuits, connectivity methods, and supporting contracts) so essential systems can resume within your defined recovery time. Operationally, this is a continuity deliverable: documented options, executed agreements, tested failover, and evidence that the alternatives meet your RTO/RPO-driven needs. (NIST Special Publication 800-53 Revision 5)

Key takeaways:

  • You need alternate telecom services and the agreements that make them available during an outage. (NIST Special Publication 800-53 Revision 5)
  • “Alternate” must map to essential functions and your defined resumption time period, not generic redundancy. (NIST Special Publication 800-53 Revision 5)
  • Auditors look for proof: designs, contracts, test results, and continuity procedures that show the alternates work. (NIST Special Publication 800-53 Revision 5)

CP-8 is a business continuity requirement disguised as a technical one. Many organizations assume their cloud region redundancy or a single ISP with “high availability” language satisfies it. Examiners typically expect more: explicit alternate telecommunications services (for example, a second carrier, separate last-mile path, separate routing, alternate VPN termination, alternate DNS resolution path, or an out-of-band management channel) and the executed agreements that guarantee access to those services when you need them. (NIST Special Publication 800-53 Revision 5)

For a FedRAMP Moderate context, your goal is simple to state and easy to miss in practice: if primary telecommunications fail, you can still restore communications for essential mission and business functions within your organization-defined time period. That time period must be defined, owned, and traceable to BIA/contingency planning decisions. (NIST Special Publication 800-53 Revision 5)

This page translates the requirement into concrete implementation steps you can assign to Network, Infrastructure, SRE/Operations, Procurement, and Security/GRC. It also lists the evidence package you should be ready to hand to a 3PAO or internal audit team, plus the most common audit hangups that cause findings.

Regulatory text

Requirement (excerpt): “Establish alternate telecommunications services, including necessary agreements to permit the resumption of organization-defined system operations for essential mission and business functions within an organization-defined time period.” (NIST Special Publication 800-53 Revision 5)

Operator interpretation:
You must (1) define which system operations are essential, (2) define how quickly telecom connectivity must be restored to support them, and (3) set up alternate telecommunications services ahead of time, backed by contracts/SLAs/MOUs that make the alternates available during an incident. A design diagram alone is not enough if procurement never executed the agreement or if the “alternate” shares the same last-mile or upstream dependencies as the primary. (NIST Special Publication 800-53 Revision 5)

Plain-English interpretation (what CP-8 is really asking)

  • “Alternate telecommunications services” means an alternate way to move the traffic your essential functions require (internet, WAN, private connectivity, voice, SMS/notification pathways, remote admin access, or management-plane connectivity). The alternates should be realistic during the exact outages you plan for (carrier outage, fiber cut, BGP event, DDoS, local power loss, building access issues). (NIST Special Publication 800-53 Revision 5)
  • “Including necessary agreements” means you cannot rely on “we can buy that during an emergency.” You need signed agreements, contract terms, and operational handoffs that make the alternate service accessible under incident conditions. (NIST Special Publication 800-53 Revision 5)
  • “Essential mission and business functions” ties CP-8 to your BIA/contingency planning scope. If your essential service cannot authenticate users without inbound connectivity, then identity traffic is in scope. If your incident response depends on paging, your notification path is in scope. (NIST Special Publication 800-53 Revision 5)
  • “Within an organization-defined time period” is your recovery time objective in practice. You define it, document it, and then prove the alternate telecom services support it. (NIST Special Publication 800-53 Revision 5)

Who this applies to

Primary audiences

  • Cloud Service Providers (CSPs) in a FedRAMP Moderate authorization path: you must show telecom resilience for the system boundary and essential services that support it. (NIST Special Publication 800-53 Revision 5)
  • Federal Agencies operating or sponsoring systems: you must ensure telecom alternates exist for agency-operated components and validate CSP claims in shared-responsibility areas. (NIST Special Publication 800-53 Revision 5)

Operational contexts where CP-8 commonly bites

  • Single ISP at a primary site supporting identity, monitoring, CI/CD, ticketing, or logging.
  • “Redundant” circuits that share the same conduit, building entrance, or upstream provider.
  • Dependence on one third-party SaaS for paging/incident comms without a backup channel.
  • Remote administration reachable only through the primary network path.

What you actually need to do (step-by-step)

1) Define the scope: essential functions and required resumption time

  • List essential mission/business functions supported by the system boundary (customer-facing service availability, authentication, security monitoring, incident communications, data replication, admin access). (NIST Special Publication 800-53 Revision 5)
  • For each, document the maximum tolerable telecom outage (your organization-defined resumption time period) and who approved it. Tie it to your contingency planning artifacts so it is defensible in assessment. (NIST Special Publication 800-53 Revision 5)

2) Identify telecom dependency chains (don’t stop at the ISP name)

Build a dependency map that includes:

  • Carrier/provider, circuit type, and termination points.
  • Last-mile route diversity (building entrance, conduit, cross-connect).
  • Upstream concentration risks (same parent carrier, same peering path).
  • Critical internal dependencies (firewalls, VPN concentrators, DNS resolvers, IPAM, certificate services used during failover).
    This map is what lets you claim “alternate” with a straight face. (NIST Special Publication 800-53 Revision 5)

3) Select alternate telecommunications services that match outage scenarios

Pick alternates based on the scenarios that threaten your resumption time period:

  • Second carrier / second circuit with demonstrable path diversity for primary sites.
  • Alternate connectivity mode (private connection vs public internet VPN; fixed line vs wireless; separate out-of-band management).
  • Alternate DNS resolution path (secondary authoritative DNS hosted separately from primary management plane).
  • Alternate incident communications channel (if primary paging/voice relies on the same network path).
    Your goal is not “more links.” It is “a credible way back to service.” (NIST Special Publication 800-53 Revision 5)

4) Execute the “necessary agreements” with third parties

For each alternate service, ensure agreements cover:

  • Provisioning terms and lead times (avoid “best effort” that won’t meet your resumption time).
  • Support and escalation during incidents (24x7 contacts, severity definitions).
  • Service description that matches the technical design (bandwidth class, routing, DDoS protections if relevant).
  • Responsibilities for testing and maintenance windows.
    If Procurement owns the contract and Operations owns the recovery, force a joint sign-off. (NIST Special Publication 800-53 Revision 5)

5) Implement routing/failover and document operational procedures

  • Configure failover (BGP policies, SD-WAN path rules, DNS failover, VPN endpoint redundancy) appropriate to your architecture.
  • Write runbooks for:
    • Declaring telecom failure and switching paths
    • Verifying restored connectivity for essential functions
    • Rolling back after primary restoration
    • Capturing incident evidence and lessons learned
      Runbooks must be usable under stress by the on-call team. (NIST Special Publication 800-53 Revision 5)

6) Test the alternates and keep proof

Run planned tests that demonstrate:

  • You can switch to alternate telecom services.
  • Essential functions resume within your defined time period.
  • Monitoring detects the failure and confirms restored service.
    A tabletop exercise helps, but CP-8 usually needs at least one technically grounded test that shows the alternate path carries real traffic. (NIST Special Publication 800-53 Revision 5)

7) Monitor drift and revalidate after changes

Telecom resilience decays as networks change. Add controls to:

  • Reassess path diversity after site moves, carrier changes, firewall refreshes, or DNS changes.
  • Re-test after material network changes.
  • Review third-party agreements for renewals and changes in service descriptions. (NIST Special Publication 800-53 Revision 5)

Required evidence and artifacts to retain

Auditors typically want a cohesive “CP-8 evidence pack.” Keep:

  • Defined essential functions list and the organization-defined resumption time period approvals. (NIST Special Publication 800-53 Revision 5)
  • Network diagrams showing primary and alternate telecom paths, termination points, and where failover occurs.
  • Dependency map showing how alternates avoid common points of failure (as-built notes, not marketing diagrams).
  • Copies or excerpts of executed agreements: contracts, SLAs, MOUs, order forms, support escalation exhibits. (NIST Special Publication 800-53 Revision 5)
  • Configuration evidence: routing policies, SD-WAN rules, VPN HA setup, DNS failover configuration.
  • Test plan, test results, and tickets/alerts showing detection and restoration.
  • Runbooks and on-call procedures; training/ops acknowledgements.
  • Exceptions register for gaps (temporary lack of diversity, pending circuit install) with remediation plan.

Common exam/audit questions and hangups

  • “Show me your organization-defined time period and where it was approved.” (NIST Special Publication 800-53 Revision 5)
  • “How do you know the alternate is actually alternate? Prove route diversity.”
  • “Where are the agreements that guarantee the alternate service during an outage?” (NIST Special Publication 800-53 Revision 5)
  • “When did you last test failover, and what was the outcome?”
  • “What essential functions fail if DNS/auth/monitoring goes down during the telecom event?”
  • “Who declares a telecom incident, and who executes failover?”

Frequent implementation mistakes (and how to avoid them)

  1. Calling two circuits “diverse” because they have different account numbers.
    Fix: demand last-mile diversity documentation and record building entrance details and upstream dependencies.

  2. Relying on “we can hotspot” as the plan for essential production operations.
    Fix: classify hotspot/wireless as a bounded workaround (management access only) unless it demonstrably supports essential traffic.

  3. Contracts exist, but Operations can’t activate the service fast enough.
    Fix: include activation steps in runbooks, validate 24x7 contacts, and do at least one activation drill.

  4. Failover is designed but never tested with real dependencies.
    Fix: test end-to-end: user auth, logging, alerting, admin access, and key external integrations.

  5. Third-party incident communications depend on the same failed path.
    Fix: add an out-of-band channel for incident coordination and executive notification.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. Practically, the risk shows up as continuity findings during FedRAMP assessments: if you cannot demonstrate contractual access to alternates and evidence of working failover within the defined time period, assessors may record deficiencies that drive remediation work and schedule risk. (NIST Special Publication 800-53 Revision 5)

Practical 30/60/90-day execution plan

Use these phases as a deployment path; adjust sequencing to your procurement lead times and network complexity.

First 30 days (Immediate)

  • Name owners across Network/Infra, Security/GRC, and Procurement for CP-8 deliverables. (NIST Special Publication 800-53 Revision 5)
  • Define essential functions and the organization-defined resumption time period; document approvals. (NIST Special Publication 800-53 Revision 5)
  • Build the telecom dependency map and identify single points of failure.
  • Inventory current third-party agreements tied to connectivity, DNS, DDoS protection, and incident communications.

Days 31–60 (Near-term)

  • Select target alternate telecom patterns per site/system (second carrier, alternate VPN, out-of-band management, secondary DNS).
  • Open procurement actions for missing agreements; add incident escalation exhibits where absent. (NIST Special Publication 800-53 Revision 5)
  • Draft runbooks and define failover decision criteria (who declares, who executes, verification steps).
  • Implement monitoring to detect telecom path failure and confirm alternate path health.

Days 61–90 (Stabilize and prove)

  • Complete at least one failover test per critical path; capture evidence, tickets, screenshots/logs, and lessons learned. (NIST Special Publication 800-53 Revision 5)
  • Close gaps discovered in testing (routing, firewall rules, DNS TTLs, access controls, alert routing).
  • Package evidence into an assessor-ready CP-8 binder.
  • Put revalidation triggers into change management (carrier change, site move, network redesign).

Tooling note (making this easier to run)

If you manage multiple third parties (carriers, colocation providers, managed DNS, DDoS protection, incident communications), CP-8 becomes a contract-and-evidence problem as much as a network problem. Daydream can centralize third-party due diligence artifacts (contracts, SLAs, escalation paths), map them to CP-8 evidence needs, and keep the assessor packet current as agreements renew or architectures change.

Frequently Asked Questions

Do we need two ISPs everywhere to meet the telecommunications services requirement?

CP-8 requires alternate telecommunications services sufficient to resume essential functions within your defined time period, not a blanket “two ISPs everywhere” rule. Document your essential functions and recovery time decision, then justify the alternate design per site/system. (NIST Special Publication 800-53 Revision 5)

Does cloud multi-region architecture satisfy CP-8 by itself?

Not automatically. CP-8 is about telecom services and agreements that enable resumption; you still need to show alternate connectivity and the operational ability to reach and operate the system during a telecom disruption. (NIST Special Publication 800-53 Revision 5)

What counts as “necessary agreements”?

Executed contracts, SLAs, MOUs, and support escalation terms that make the alternate service available during incidents. If you cannot show enforceable terms and activation/support pathways, auditors may treat the alternate as hypothetical. (NIST Special Publication 800-53 Revision 5)

How do we prove the alternate path is truly independent?

Keep route diversity evidence from providers (where available), as-built diagrams, and a dependency map showing different last-mile entries or upstream providers. Pair that with a failover test that demonstrates traffic successfully runs on the alternate. (NIST Special Publication 800-53 Revision 5)

What if procurement lead times prevent immediate alternate circuits?

Document a time-bound risk acceptance with compensating controls (for example, limited-scope out-of-band access for emergency admin tasks) and show an executed plan to obtain alternates. Keep the remediation plan and current status in your evidence pack. (NIST Special Publication 800-53 Revision 5)

How often should we test alternate telecommunications services?

CP-8 does not state a specific frequency in the provided text. Set a cadence based on change rate and criticality, and re-test after material network or provider changes so your evidence stays credible. (NIST Special Publication 800-53 Revision 5)

Frequently Asked Questions

Do we need two ISPs everywhere to meet the telecommunications services requirement?

CP-8 requires alternate telecommunications services sufficient to resume essential functions within your defined time period, not a blanket “two ISPs everywhere” rule. Document your essential functions and recovery time decision, then justify the alternate design per site/system. (NIST Special Publication 800-53 Revision 5)

Does cloud multi-region architecture satisfy CP-8 by itself?

Not automatically. CP-8 is about telecom services and agreements that enable resumption; you still need to show alternate connectivity and the operational ability to reach and operate the system during a telecom disruption. (NIST Special Publication 800-53 Revision 5)

What counts as “necessary agreements”?

Executed contracts, SLAs, MOUs, and support escalation terms that make the alternate service available during incidents. If you cannot show enforceable terms and activation/support pathways, auditors may treat the alternate as hypothetical. (NIST Special Publication 800-53 Revision 5)

How do we prove the alternate path is truly independent?

Keep route diversity evidence from providers (where available), as-built diagrams, and a dependency map showing different last-mile entries or upstream providers. Pair that with a failover test that demonstrates traffic successfully runs on the alternate. (NIST Special Publication 800-53 Revision 5)

What if procurement lead times prevent immediate alternate circuits?

Document a time-bound risk acceptance with compensating controls (for example, limited-scope out-of-band access for emergency admin tasks) and show an executed plan to obtain alternates. Keep the remediation plan and current status in your evidence pack. (NIST Special Publication 800-53 Revision 5)

How often should we test alternate telecommunications services?

CP-8 does not state a specific frequency in the provided text. Set a cadence based on change rate and criticality, and re-test after material network or provider changes so your evidence stays credible. (NIST Special Publication 800-53 Revision 5)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
FedRAMP Moderate: Telecommunications Services | Daydream