๐ผ PL-1 Policy and Procedures | | | | |
๐ผ PL-2 System Security and Privacy Plans | 3 | | | |
ย ย ย ย ๐ผ PL-2(1) System Security and Privacy Plans _ Concept of Operations | | | | |
ย ย ย ย ๐ผ PL-2(2) System Security and Privacy Plans _ Functional Architecture | | | | |
ย ย ย ย ๐ผ PL-2(3) System Security and Privacy Plans _ Plan and Coordinate with Other Organizational Entities | | | | |
๐ผ PL-3 System Security Plan Update | | | | |
๐ผ PL-4 Rules of Behavior | 1 | | | |
ย ย ย ย ๐ผ PL-4(1) Rules of Behavior _ Social Media and External Site/application Usage Restrictions | | | | |
๐ผ PL-5 Privacy Impact Assessment | | | | |
๐ผ PL-6 Security-related Activity Planning | | | | |
๐ผ PL-7 Concept of Operations | | | | |
๐ผ PL-8 Security and Privacy Architectures | 2 | | | |
ย ย ย ย ๐ผ PL-8(1) Security and Privacy Architectures _ Defense in Depth | | | | |
ย ย ย ย ๐ผ PL-8(2) Security and Privacy Architectures _ Supplier Diversity | | | | |
๐ผ PL-9 Central Management | | | | |
๐ผ PL-10 Baseline Selection | | | | |
๐ผ PL-11 Baseline Tailoring | | | | |