Add description, images, menus and links to your mega menu
A column with no settings can be used as a spacer
Link to your collections, sales and even external links
Add up to five columns
Add description, images, menus and links to your mega menu
A column with no settings can be used as a spacer
Link to your collections, sales and even external links
Add up to five columns
October 18, 2023 3 min read
1. System Overview: Provide a description of the information system, its purpose, intended use, system owner, system identifier, and system categorization.
2. System Boundaries: Clearly define the boundaries of the information system, including its hardware, software, and network components. Identify interfaces with other systems and any external connections.
3. Risk Assessment: Conduct a risk assessment to identify potential threats, vulnerabilities, and risks to the information system's security and privacy. Assess the likelihood and impact of these risks and prioritize them based on their significance.
4. Security and Privacy Controls: Identify and document the security and privacy controls that are implemented or planned to protect the information system. Select the controls from the NIST 800-53 control catalog and the NIST Privacy Framework based on their relevance to the LOW impact level.
5. Control Implementation: Describe how each selected security and privacy control is implemented within the information system. Provide details on how the controls are designed, configured, and managed to meet the specific security and privacy requirements.
6. Control Assessment: Assess the effectiveness of the implemented security and privacy controls in mitigating risks. This may involve testing, audits, or other evaluation methods to validate their performance.
7. Contingency Planning: Develop a contingency plan that outlines procedures for responding to and recovering from incidents that may impact the system's availability, integrity, or privacy. Include backup and recovery strategies, incident response procedures, and communication protocols.
8. Personnel Security: Document the measures in place to ensure that individuals who have access to the system are trustworthy and adequately trained. This includes background checks, security and privacy awareness training, and role-based access controls.
9. Physical and Environmental Protection: Describe the physical security measures in place to protect the information system. This includes access controls, visitor management, equipment protection, and environmental monitoring.
10. Security and Privacy Awareness and Training: Outline the security and privacy awareness and training programs provided to system users and administrators. Include details on the content, frequency, and delivery methods of the training sessions.
11. System Maintenance: Describe the procedures and practices for maintaining the security and privacy of the information system. This includes patch management, configuration management, vulnerability scanning, and system documentation updates.
12. System Monitoring: Document the monitoring mechanisms in place to detect and respond to security and privacy incidents. This includes the collection and analysis of system logs, intrusion detection systems, and privacy event monitoring.
Tailor the SSP to the specific characteristics and requirements of your organization's information system at the LOW impact level. Ensure the SSPP is periodically reviewed and updated to address changes in the system's environment, emerging threats and vulnerabilities, and evolving privacy requirements.
About Arlington
We are Arlington, a team of innovative, solution-oriented, highly agile, and well-versed professionals with decades of experience in working with America’s defense industry. From emerging cybersecurity regulations to helping our clients solve complex security & compliance solutions – and so much more – you can trust Arlington, the firm that’s Dedicated to Defense®. Learn more at arlingtonintel.com.