Security Plan Template
Security Plan Template
Security Plan Template
(derived from template used by the U.S. Department of Defense for Classified Systems)
DOCUMENT HISTORY
Revision: Date Revised: Filename: Path hyperlink Revision History
Author Date Comments
Responsible Parties
Name Email
Document Overview
This document describes the scope and approach, and resources required to assure the security of the {system name} system. Maintenance of this document is the sole responsibility of {enter title/division} The execution of the guidelines included herein are the responsibility of {list the titles/divisions of all responsible parties} The testing, certification and inspection of this system and its component parts is the sole responsibility of {name the test group and auditing division}. Standards Compliance: This system achieves corporate security standards and complies with all relevant corporate and industry security policies unless otherwise specified. System Purpose: The purpose of this application is to {high level description} System Boundaries: {Describe the boundaries of the system and all components contained within it, or on which it is dependent, whose security requirements will be addressed in this document} Scope Limitations: This Security Plan addresses only {describe the boundaries addressed in this document.}
2.
DEFINITIONS
For the purposes of this document, the following definitions will be used System Definition {describe in detail the component parts of the system, their relevance to the system and any extra system dependencies that must be considered in the plan} {Enter any other definitions that would not be commonly known to a member of the Companys legal department or Business management}
3. 4.
Information common to several systems or networks will be available at a common site or information contained in other documents may be attached to or referenced in the Security Plan.
5.
The Security Plan formally documents the operation of this system, and the measures that are used to control access and protect the protected system and its information. To make appropriate accreditation decisions, responsible parties need to understand the complete classified environment. Therefore, at a minimum, this Security Plan will contain the following information:
A. Introduction.
1) The identification and location of the system/network. 2) A brief narrative description of the system/network including its mission or purpose.
Security Personnel
The name, location, and contact information of the responsible System Owner, Architect, Administrator, Maintenance Facilitator and the Data/ Application Owner (if appropriate),including emergency contact numbers.
Access authorization
(e.g., Access to Special Access Programs);
Personnel Security.
State the range of security clearance levels, the set of formal access approvals, and the need-to-know status of users.
Physical Protection
The documentation of any special physical protection requirements unique to the system.
Security Contracts
A copy of any security contracts (memoranda of understanding, emails or other tangible proofs) with other persons, departments, companies or external entities and a list of all security contracts associated with the system.
If there are no unique threats or vulnerabilities, a statement to that effect will be entered.
Mitigating Countermeasures
Another statement will document will describe the countermeasures that will be used to mitigate identified vulnerabilities.
Personnel Security.
Describe, attach, or reference the personnel procedures implemented.
Physical Security.
Provide a brief description of the physical security environment, e.g., type of Security Area, minimum security clearance level allowed (reference any Site Safeguards and or other Security Plan.
Telecommunications Security
Include or reference any Protected Distribution System documentation and its provisions.
Administrative Security
Describe or reference procedures for administration, if passwords are used for authentication of system access control.
Password Security
Describe the protection requirements and procedures for all authenticators including passwords.
Scavenging Security
Describe or reference procedures to protect against scavenging.
Hardening Methods
Describe the tools and techniques that will be used to insure risk to the system is minimized.
Technical Security a. Describe or reference the auditing procedures to be followed b. Describe the Shut down procedures when a failure of the real time auditing
capability is detected.
c. Define the time lockout interval of inactivity in interactive sessions d. Describe the restart requirements Evaluated Product Dependencies
List products or justification for alternatives methods, hardware, or software.
Certification Process
Describe the application software certification process including most recent historical trending and security test results.
Network Requirements
If the classified is implemented as a network, the Classified Security Plan will also address the following items: (a) Overview of the Network. (b) Include descriptions of the sub-networks, servers, hosts. (c) Communications Protocols (d) Briefly describe all protocols used in the network.
Security Policies
Describe or reference the network security policies and procedures. If referenced, include a brief synopsis of the referenced policies and procedures, including: (a) Network Access control policies. (b) Network Authorization and authentication policies.
Remote Maintenance/Diagnostics
If approved remote diagnostic or maintenance services are to be used, specify the methods of connection, disconnection, and security measures.
Continuity of Operations
Describe the Continuity of Operations Plan, if available. If the decision was made to have a continuity of operations plan, reference the plan, and include a short abstract of the plan. Include the documentation of the frequency and cost to exercise the plan, any approval documentation, and provide or reference a list of the applications on the system that require a continuity of operations plan. In the absence of a Continuity of Operations Plan, describe the process used to protect the current backup copies of software, data, applications, and the documentation judged to be essential to the continued operation of the system.
System Graphic Emergency Contact List Position in Network Graphic Network Security Policy Schedule of Performance Certification Testing & Results Schedule of Audit Inspections & Results Enterprise Interconnected Systems Security Plan
A Network operating as part of an Enterprise Interconnected networks system, the Enterprise Network Security Plan should be referenced in the System Security Plan. Relevant references should include: (a) Designates the individuals responsible for the secure operation of the Interconnected Network; (b) Describe the secure operating environment and protections of the Network Security Support Structure including a description of the operation of any Controlled Interfaces; (c) Identify any special security responsibilities of the users of the Interconnected Network (d) Lists the networks (Interconnected or Unified) and systems that comprise the Interconnected Network (e) Include a copy of the Security Contract for each separately accredited network or and a copy of their relevant Security Requirements Specifications, provided as attachments.