Skip to main content

💼 PL-8 Security and Privacy Architectures

  • Contextual name: 💼 PL-8 Security and Privacy Architectures
  • ID: /frameworks/nist-sp-800-53-r5/pl/08
  • Located in: 💼 PL Planning

Description

a. Develop security and privacy architectures for the system that:

  1. Describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information;
  2. Describe the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals;
  3. Describe how the architectures are integrated into and support the enterprise architecture; and
  4. Describe any assumptions about, and dependencies on, external systems and services; b. Review and update the architectures [Assignment: organization-defined frequency] to reflect changes in the enterprise architecture; and c. Reflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality analysis, organizational procedures, and procurements and acquisitions.

Similar

  • Internal
    • ID: dec-c-639062b7

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 PL-8 Security and Privacy Architectures (L)(M)(H)3
💼 FedRAMP Low Security Controls → 💼 PL-8 Security and Privacy Architectures (L)(M)(H)3
💼 NIST CSF v2.0 → 💼 ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained48

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 PL-8(1) Security and Privacy Architectures _ Defense in Depth
💼 PL-8(2) Security and Privacy Architectures _ Supplier Diversity

Policies (3)

PolicyLogic CountFlags
📝 Google API Key is not restricted for unused APIs 🟢1🟢 x6
📝 Google API Key is not rotated every 90 days 🟢1🟢 x6
📝 Google Project has API Keys 🟢1🟠 x1, 🟢 x5