Security Assessment Plan Extensible
Security Assessment Plan Extensible
Security Assessment Plan Extensible
Test_2015-01-15-1052
Prepared for
16 January 2015
Table of Contents
1.0 Introduction.....................................................................................................................................1
1.1 Scope...........................................................................................................................................1
1.2 Assumptions/Limitations.............................................................................................................1
1.2.1 Assumption..........................................................................................................................1
1.2.2 Limitations...........................................................................................................................1
5.0 Schedule..........................................................................................................................................3
6.3.1 Hardware.............................................................................................................................4
6.3.2 Software...............................................................................................................................4
Acronyms.....................................................................................................................................................6
Appendix B. RTM.......................................................................................................................................1
1.0 Introduction
1.1 Scope
This Security Assessment Plan (SAP) was developed using the guidance contained in NIST SP 800-37,
Guidelines for Applying the Risk Management Framework to Federal Information Systems, and
incorporates policy from the Department of Homeland Security (DHS) Management Directive (MD)
4300, Department of Homeland Security Information Technology Security Program Publication, Volume I,
Policy Guide. Documentation contained in this plan will be used in support of the Security Assessment
and Authorization efforts for Test_2015-01-15-1052 by the Authorizing Official (AO).
This SAP calls for a series of system assessments and tests to exercise the security features and
procedures of the Test_2015-01-15-1052 against all applicable security requirements of MD 4300;
vulnerability testing of the operational system is also planned. A site assessment of the facilities
(building and rooms) will be performed to evaluate the security safeguards and controls of the operating
environment. Additional tests will be devised as needed to assess newly identified vulnerabilities during
the security assessment. Elements to be tested are defined within the authorization boundary
described in Section 1 of the Test_2015-01-15-1052 Security Plan. The specific system security controls
and security requirements to be satisfied by this system are listed in Sections 2 through 19 of the
Test_2015-01-15-1052 Security Plan.
1.2 Assumptions/Limitations
1.2.1 Assumption
{Assumptions place rules of conduct, expectations, and communications on testing and observations for
the security assessment. The following assumptions are examples of assumptions:
The security assessment team will have access to all relevant documentation for the system.
The security assessment automated scans are configured to be the prevent interruptions in
network and system services.
Both the hardware and software is configured for operational use throughout the duration of the
testing.}
1.2.2 Limitations
{Limitations should include a discussion of any system elements or locations that are not planned to be
part of this test and evaluation}
Assessment Tools
{Nessus is an active
vulnerability scanner, featuring
discovery, configuration
auditing, asset profiling,
sensitive data discovery and
vulnerability analysis of your
{Nessus} {John Doe, Security Engineer}
security posture. Nessus
scanners can be distributed
throughout an entire
enterprise, inside DMZs and
across physically separate
networks.}
to conducting the assessment. This letter will authorize the Assessment team to use the tools indicated
to perform scans on Test_2015-01-15-1052.
Identify the Management Personnel (e.g. Information System Security Officer [ISSO], Component Chief
Information Security Officer [CISO]/Information System Security Manager [ISSM], AO)
Management Personnel
No personnel for this table have been added to the project personel page
System Personnel
5.0 Schedule
Document the major actions and activities associated with the assessment of Test_2015-01-15-1052.
6.3.2 Software
Access Methods
Discuss findings with System Administrator to ensure validity. It is permissible for the SA to
correct findings on-the-spot (if applicable) or provide justification to mitigate the finding.
Acronyms
AO Authorizing Official
CISO Chief Information Security Officer
DHS Department of Homeland Security
FIPS Federal Information Processing Standards
ISSO Information System Security Manager
NIST National Institute of Standards and Technology
POA&M Plan of Action and Milestones
RMS Risk Management System
RTM Requirements Traceability Matrix
SAP Security Assessment Plan
SAR Security Assessment Report
SP Special Publication (NIST)
Security Plan
2. I expect all personnel to comply with their requests and to extend all necessary courtesies to
them in order to ensure an accurate and timely assessment. These individuals are authorized 24-
hour daily access to the following unit buildings, facilities, and access point:
A-1
3. If any questions should arise concerning this memorandum or the survey assessment execution,
contact [CONTACT NAME] at [CONTACT PHONE DURING DUTY HOURS] during duty hours or
[CONTACT PHONE DURING NON-DUTY HOURS] during non-duty hours.
______________________________________________________________________________
A-2
Appendix B. RTM
The definition of the fields in the RTM are provided in Table B-1.
Test #(s) The ID number of the specific test procedure(s) that is used to
validate the requirement or control.
B-1
Methods The evaluation method (or methods) used to assess the requirement.
I. Interview.
E. Examine.
T. Testing.
Result The summarized result for the test procedures that cover the
requirement/control.
Notes Identifies the factor, and the basis for; any tailoring of controls from
the baseline or organizational overlay that was used for the system.
B-2