๐ผ PL-2 System Security and Privacy Plans
- Contextual name: ๐ผ PL-2 System Security and Privacy Plans
- ID:
/frameworks/nist-sp-800-53-r5/pl/02
- Located in: ๐ผ PL Planning
Descriptionโ
a. Develop security and privacy plans for the system that:
- Are consistent with the organizationโs enterprise architecture;
- Explicitly define the constituent system components;
- Describe the operational context of the system in terms of mission and business processes;
- Identify the individuals that fulfill system roles and responsibilities;
- Identify the information types processed, stored, and transmitted by the system;
- Provide the security categorization of the system, including supporting rationale;
- Describe any specific threats to the system that are of concern to the organization;
- Provide the results of a privacy risk assessment for systems processing personally identifiable information;
- Describe the operational environment for the system and any dependencies on or connections to other systems or system components;
- Provide an overview of the security and privacy requirements for the system;
- Identify any relevant control baselines or overlays, if applicable;
- Describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions;
- Include risk determinations for security and privacy architecture and design decisions;
- Include security- and privacy-related activities affecting the system that require planning and coordination with [Assignment: organization-defined individuals or groups]; and
- Are reviewed and approved by the authorizing official or designated representative prior to plan implementation. b. Distribute copies of the plans and communicate subsequent changes to the plans to [Assignment: organization-defined personnel or roles]; c. Review the plans [Assignment: organization-defined frequency]; d. Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments; and e. Protect the plans from unauthorized disclosure and modification.
Similarโ
- Internal
- ID:
dec-c-35aa25a1
- ID:
Similar Sections (Give Policies To)โ
Sub Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
๐ผ PL-2(1) System Security and Privacy Plans _ Concept of Operations | ||||
๐ผ PL-2(2) System Security and Privacy Plans _ Functional Architecture | ||||
๐ผ PL-2(3) System Security and Privacy Plans _ Plan and Coordinate with Other Organizational Entities |