Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Security Plans

Security Plans

The security planning process eventually produces a Site Security Plan, known as the "Security Plan" or SSP. The security plan provides an overview of the security requirements of the system and the security controls designed to meet those requirements. It is a compilation of all the documentation produced by the key security processes.

The security planning process begins in the INITIATION phase of the SDLC, where system characterization describes the system and its mission and functions. The output from impact assessments offer the beginnings of the security plan and provide input for the risk assessment process.

Once the risk assessment has helped define the requirements and security controls have selected and tailored, the security controls and any modification made to them must be documented. As the controls are implemented, the configuration settings associated with them must also be documented and should be included in or referenced by the configuration managment plan.

Assemble the plan - some of the supporting pieces that should either be included in the main body of the security plan or attached as appendices or external documents include:

  • Business Impact Assessment
  • Privacy Assessment
  • Risk Assessment
  • Configuration Management Plan
  • Contingency Plan
  • Awareness and Training Plan
  • Incident Response Plan
  • Security Impact Assessment
  • Rules of Behavior
  • Authorization (C&A)
  • POAMs

KEY NIST DOCS:
800-18 "Guide for Developing Security Plans for Federal Information Systems"
800-53 "Recommended Security Controls for Federal Information System"
800-100 "Information Security Handbook: A Guide for Managers"
FIPS 200 "Minimum Security Requirements for Federal Information and Information Systems"


Warning: Use of undefined constant php - assumed 'php' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/themes/structure/tmp-secplans.php on line 42
Awareness and Training
Policy and Procedure
Rules of Behavior
POAMs
Incident Response
Contingency Plan Contingency Plan
Wireless Restrictions