πΌ PL-2 System Security and Privacy Plans (L)(M)(H)
- Contextual name: πΌ PL-2 System Security and Privacy Plans (L)(M)(H)
- ID:
/frameworks/fedramp-moderate-security-controls/pl/02
- Located in: πΌ Planning
Descriptionβ
a. Develop security and privacy plans for the system that:
-
Are consistent with the organization's enterprise architecture;
-
Explicitly define the constituent system components;
-
Describe the operational context of the system in terms of mission and business processes;
-
Identify the individuals that fulfill system roles and responsibilities;
-
Identify the information types processed, stored, and transmitted by the system;
-
Provide the security categorization of the system, including supporting rationale;
-
Describe any specific threats to the system that are of concern to the organization;
-
Provide the results of a privacy risk assessment for systems processing personally identifiable information;
-
Describe the operational environment for the system and any dependencies on or connections to other systems or system components;
-
Provide an overview of the security and privacy requirements for the system;
-
Identify any relevant control baselines or overlays, if applicable;
-
Describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions;
-
Include risk determinations for security and privacy architecture and design decisions;
-
Include security- and privacy-related activities affecting the system that require planning and coordination with [FedRAMP Assignment: to include chief privacy and ISSO and/or similar role or designees]; and
-
Are reviewed and approved by the authorizing official or designated representative prior to plan implementation.
b. Distribute copies of the plans and communicate subsequent changes to the plans to [FedRAMP Assignment: to include chief privacy and ISSO and/or similar role];
c. Review the plans [FedRAMP Assignment: at least annually];
d. Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments; and
e. Protect the plans from unauthorized disclosure and modification.
Similarβ
- Sections
/frameworks/fedramp-high-security-controls/pl/02
- Internal
- ID:
dec-c-5a7498d8
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ FedRAMP High Security Controls β πΌ PL-2 System Security and Privacy Plans (L)(M)(H) |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|