System Security Plan (ssp) Categorization: Moderate-Low-Low



Download 0.65 Mb.
Page2/16
Date02.05.2018
Size0.65 Mb.
#47206
1   2   3   4   5   6   7   8   9   ...   16

Background


The transition to Risk Management Framework (RMF) within NISP, all systems including Local Area Networks, Wide Area Networks and Interconnected Networks, requiring authorization or re-authorization will follow the RMF methodology for Local Area Networks, Wide Area Networks and Interconnected Systems.

This document is based on the DSS Assessment and Authorization Process Manual (DAAPM)



  1. Applicability


This template is applicable to all Information Systems (IS) that store, process and/or transmit classified information.
  1. References


This document is based on the following references:

  • NIST SP 800-53, Security Controls for Federal Information Systems and Organizations, Revision 4, Apr 13

  • CNSSI 1253, Security Categorization and Control Selection for National Security Systems, 12 May 14

  • DSS DAAPM
  1. Reciprocity


Reciprocity is defined as a “Mutual agreement among participating enterprises to accept each other’s security assessments in order to reuse information system resources and/or to accept each other’s assessed security posture in order to share information.” [CNSSI 4009]
This agreement, however, does not imply blind acceptance. The body of evidence used for assessments of the subject system will be provided to the other participant(s) who have a vested interest in establishing a mutual agreement. The receiving party will review the assessment evidence (e.g., system security plan (SSP), test plans, test procedures, test reports, exceptions) and determine if there are any deltas in the evidence, (e.g., baseline/overlay controls that were tailored, a test item that was omitted), and identify items that may require negotiations.
Reciprocity means that the system(s) will not be retested or undergo another full assessment. In the spirit of reciprocity, the existing assessments will be accepted; only controls, test items or other pertinent items that were initially omitted are subject to evaluation/testing to assure the system meets any additional protections required for a successful reciprocal agreement.

  1. System Identification




    1. System Overview


System Name

Click here to enter text.

DSS UID

Click here to enter text.

Type of Information System (Check One)

Standalone (SUSA)

Multi-User Standalone (MUSA)

Closed Restricted Network (Local Area Network(LAN))

Wide Area Network (WAN)

Interconnected System – Contractor-to-Contractor (C2C)

Interconnected System – Contractor-to-Government (G2G)

Other:


Type of Plan:

SSP

MSSP (Type Authorization)

The system is in the life-cycle phase noted in the table below.

System Status (Check One):



Operational

The system is operating and in production.



Under Development

The system is being designed, developed, or implemented



Major Modification

The system is undergoing a major change, development, or transition.



Other

Explain: Click here to enter text.
    1. Security Categorization

      1. Summary Results and Rationale


Summarize information in the sections below; e.g., System X is categorized as a Moderate-Low-Low system processing xxx information types. A risk analysis indicated that no risk adjustment tailoring was required.
      1. Categorization Detailed Results

      2. Information Impact Categorization


Information Impact Categorization (CNSSI 1253 Reference: 2.1.1)

Information Type

Confidentiality Impact

Integrity Impact

Availability Impact

Authority





Choose an item.

Choose an item.

Choose an item.

e.g., .ISO

Click here to enter text.

Choose an item.

Choose an item.

Choose an item.

e.g., SCG


System Security Impact Categorization


Final System Impact Categorization (CNSSI 1253 Reference: 2.1.2)

Confidentiality Impact

Integrity Impact

Availability Impact

Authority

Risk Adjusted System Impact Categorization


Risk Adjusted System Impact Categorization (CNSSI 1253 Reference: 2.1.3)

Confidentiality Impact

Integrity Impact

Availability Impact

Authority

Organization: Click here to enter text.

Address: Click here to enter text.

Phone: Click here to enter text.

Email: Click here to enter text.
Representative (AO-R)

Name: Click here to enter text.

Organization: Click here to enter text.

Address: Click here to enter text.

Phone: Click here to enter text.

Email: Click here to enter text.


System Control Assessor (SCA)

Name: Click here to enter text.

Organization: Click here to enter text.

Address: Click here to enter text.

Phone: Click here to enter text.

Email: Click here to enter text.


Information Owner

Name: Click here to enter text.

Organization: Click here to enter text.

Address: Click here to enter text.

Phone: Click here to enter text.

Email: Click here to enter text.




Information System Owner (ISO)/Program Manager (PM)

Name: Click here to enter text.

Organization: Click here to enter text.

Address: Click here to enter text.

Phone: Click here to enter text.

Email: Click here to enter text.




    1. Download 0.65 Mb.

      Share with your friends:
1   2   3   4   5   6   7   8   9   ...   16




The database is protected by copyright ©ininet.org 2024
send message

    Main page