Skip to main content

πŸ’Ό PL-2 SYSTEM SECURITY PLAN

  • Contextual name: πŸ’Ό PL-2 SYSTEM SECURITY PLAN
  • ID: /frameworks/nist-sp-800-53-r4/pl/02
  • Located in: πŸ’Ό PL PLANNING

Description​

The organization: PL-2a. Develops a security plan for the information system that: PL-2a.1. Is consistent with the organization???s enterprise architecture; PL-2a.2. Explicitly defines the authorization boundary for the system; PL-2a.3. Describes the operational context of the information system in terms of missions and business processes; PL-2a.4. Provides the security categorization of the information system including supporting rationale; PL-2a.5. Describes the operational environment for the information system and relationships with or connections to other information systems; PL-2a.6. Provides an overview of the security requirements for the system; PL-2a.7. Identifies any relevant overlays, if applicable; PL-2a.8. Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and PL-2a.9. Is reviewed and approved by the authorizing official or designated representative prior to plan implementation; PL-2b. Distributes copies of the security plan and communicates subsequent changes to the plan to [Assignment: organization-defined personnel or roles]; PL-2c. Reviews the security plan for the information system [Assignment: organization-defined frequency]; PL-2d. Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments; and PL-2e. Protects the security plan from unauthorized disclosure and modification.

Similar​

  • Internal
    • ID: dec-c-7bee5b0b

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό DE.DP-5: Detection processes are continuously improved1416
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.IP-7: Protection processes are improved2

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PL-2 (1) CONCEPT OF OPERATIONS
πŸ’Ό PL-2 (2) FUNCTIONAL ARCHITECTURE
πŸ’Ό PL-2 (3) PLAN _ COORDINATE WITH OTHER ORGANIZATIONAL ENTITIES

Policies (2)​

PolicyLogic CountFlags
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-bcae85fb2