Fedramp system Security Plan (ssp) High Baseline Template


Information Security Policies and Procedures



Download 1.2 Mb.
Page466/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   462   463   464   465   466   467   468   469   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics
Information Security Policies and Procedures

Enter Information System Abbreviation A1 ISPP xx v1.0

. enter extension

User Guide

Enter Information System Abbreviation A2 UG v1.0

. enter extension

Digital Identity Worksheet

Included in Section 15




PTA

Included in Section 15




PIA (if needed)

Enter Information System Abbreviation A4 PIA v1.0

. enter extension

Rules of Behavior

Enter Information System Abbreviation A5 ROB v1.0

. enter extension

Information System Contingency Plan

Enter Information System Abbreviation A6 ISCP v1.0

. enter extension

Configuration Management Plan

Enter Information System Abbreviation A7 CMP v1.0

. enter extension

Incident Response Plan

Enter Information System Abbreviation A8 IRP v1.0

. enter extension

CIS Workbook

Enter Information System Abbreviation A9 CIS Workbook v1.0

. enter extension

FIPS 199

Included in Section 15




Inventory

Enter Information System Abbreviation A13 INV v1.0

. enter extension




  1. Information Security Policies and Procedures

All Authorization Packages must include an Information Security Policies and Procedures attachment, which will be reviewed for quality.

  1. User Guide

All Authorization Packages must include an Information Security Policies and Procedures attachment, which will be reviewed for quality.

  1. Digital Identity Worksheet

This Attachment Section has been revised to include the Digital Identity template. Therefore, a separate attachment is not needed.

Delete this note and all other instructions from your final version of this document.

The Digital Identity section explains the objective for selecting the appropriate Digital Identity levels for the candidate system. Guidance on selecting the system authentication technology solution is available in NIST SP 800-63, Revision 3, Digital Identity Guidelines.



Download 1.2 Mb.

Share with your friends:
1   ...   462   463   464   465   466   467   468   469   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page