A simplified example of a System Security Plan (SSP) for NIST SP 800-171 compliance.

Remember that there’s no prescribed format, but the essential information from [SP 800-171 Requirement] should be conveyed in the plan.

System Security Plan (SSP) Example for NIST SP 800-171Compliance

1. Introduction

  • System Name: XYZ Corporation’s Financial Management System
  • System Owner: John Doe
  • System Description: The financial management system processes Controlled Unclassified Information (CUI) related to payroll, contracts, and invoices.

2. System Boundaries

  • In-Scope Components: some: some:some text
       
    • Web server
    •  
    • Database server
    •  
    • Workstations used by financial staff
  •  
  • Out-of-Scope Components: some: some:some text
       
    • Public-facing website (no CUI processing)

3. CUI Handling

  • CUI Categories Processed: some: some:some text
       
    • Payroll data
    •  
    • Contract details
    •  
    • Invoices
  •  
  • CUI Storage Locations: some: some:some text
       
    • Encrypted database
    •  
    • Secure file shares
  •  
  • CUI Transmission Methods: some: some:some text
       
    • Encrypted email
    •  
    • Secure FTP

4. Security Controls

Access Control

  • Role-based access control (RBAC) implemented.
  • Least privilege principle followed.
  • Regular access reviews conducted.

Configuration Management

  • Regular vulnerability assessments.
  • Patch management process in place.
  • Configuration baselines documented.

Incident Response

  • Incident response plan developed.
  • Security incidents reported to the incident response team.
  • Escalation procedures defined.

Personnel Security

  • Background checks for employees with access to CUI.
  • Security awareness training provided annually.

Physical Security

  • Access controls to server rooms.
  • Visitor logs maintained.
  • CCTV surveillance.

System and Communications Protection

  • Firewall rules configured.
  • Encryption for data in transit (TLS/SSL).
  • Network segmentation for CUI traffic.

System and Information Integrity

  • File integrity monitoring.
  • Security logs retained for auditing.
  • Regular security assessments.

5. POAM (Plan of Action and Milestones)

  • Identified vulnerabilities: some text
       
    • Missing patches on web server (address by May 2024).
    •  
    • Weak password policy (address by June 2024).

6. Review and Approval

  • System Owner Approval: John Doe
  • Security Officer Approval: Jane Smith

Remember that this is a simplified example. In practice, your organization’s SSP mayinclude additional details, diagrams, and references to specific controls.Always tailor your SSP to your system’s unique characteristics andorganizational requirements. For more comprehensive templates, refer tothe NIST SP 800-171 System SecurityPlan Template.

Services