CMMC CA.2.157 - Develop and Periodically Update System Security Plans

CMMC CA.2.157 - Develop and Periodically Update System Security Plans

Requirement text: CA.2.157: Develop, document, and periodically update system security plans that
describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
System security plans relate security requirements to a set of security controls. System
security plans also describe, at a high level, how the security controls meet those security
requirements, but do not provide detailed, technical descriptions of the design or
implementation of the controls. System security plans contain sufficient information to
enable a design and implementation that is unambiguously compliant with the intent of the
plans and subsequent determinations of risk if the plan is implemented as intended. Security
plans need not be single documents; the plans can be a collection of various documents
including documents that already exist. Effective security plans make extensive use of
references to policies, procedures, and additional documents (e.g., design and
implementation specifications) where more detailed information can be obtained. This
reduces the documentation requirements associated with security programs and maintains
security-related information in other established management/operational areas related to
enterprise architecture, system development life cycle, systems engineering, and acquisition.

Federal agencies may consider the submitted system security plans and plans of action as
critical inputs to an overall risk management decision to process, store, or transmit CUI on a
system hosted by a nonfederal organization and whether it is advisable to pursue an
agreement or contract with the nonfederal organization.

NIST SP 800-18 provides guidance on developing security plans.

CMMC CLARIFICATION
A system security plan (SSP) is a document that outlines how an organization implements
its security requirements. An SSP outlines the roles and responsibilities of security
personnel. It details the different security standards and guidelines that the organization
follows. An SSP should include high-level diagrams that show how connected systems talk
to each other. The organization should outline in its SSP its design philosophies. Design
philosophies include defense-in-depth strategies as well as allowed interfaces and network
protocols. All information in the SSP should be high-level. Include enough information in
the plan to guide the design implementation of the organization’s systems. Reference
existing policies and procedures in the SSP.

Example
You are in charge of system security in your organization. As part of your job, you develop a
system security plan (SSP). The SSP tells all employees how they can meet the organization’s
system security goals. The information in the SSP should explain how you should handle
your important information. Examples include who can access important information,
where you should store it, and how you can transmit it. By defining a clear SSP, you can
design and build your network to ensure that it meets the SSP-defined goals. You can also
use your SSP to outline the organization’s:
      • security requirements;
      • the current status of the requirements; and
      • your plan to meet the requirements in the future.

References
• NIST SP 800-171 Rev 1 3.12.4
• NIST CSF v1.1 PR.IP-7
• NIST SP 800-53 Rev 4 PL-2
    • Related Articles

    • CMMC CA.2.158 - Periodically Assess Effectiveness of Security Controls

      Requirement text: CA.2.158: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations assess security controls ...
    • Security Assessment: SP 800-171 Security Family 3.12

      A security requirement assessment is the testing and/or evaluation of the management, operational, and technical security requirements on a system to determine the extent to which the requirements are implemented correctly, operating as intended, and ...
    • CMMC CA.2.159 - Implement Plans of Action to Address Vulnerabilities

      Requirement text: CA.2.159: Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 The plan of action is a key ...
    • System and Information Integrity: SP 800-171 Security Family 3.14

      Integrity is defined as guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. It is the assertion that data can only be accessed or modified by the authorized employees. ...
    • Personnel Security: SP 800-171 Security Family 3.9

      Users play a vital role in protecting a system as many important issues in information security involve users, designers, implementers, and managers. How these individuals interact with the system and the level of access they need to do their jobs ...