Coconote
AI notes
AI voice & video notes
Try for free
🛡️
System Security Plan (SSP) Overview by Mike Green
Jun 6, 2024
System Security Plan (SSP)
Introduction
Speaker
: Mike Green, Cyber Security Engineer at Optics Cyber Solutions
Topic
: Overview of a System Security Plan (SSP)
Definition of SSP
A document providing an overview of security controls applied to a system to meet specific security requirements.
Requirements drawn from catalogs such as:
NIST 853
NIST 800-171
CMMC (Cyber Security Maturity Model Certification)
SSP is a living document, updated throughout the system lifecycle.
Background
FISMA (2002)
: Mandated federal systems documentation within an SSP using NIST 853 controls.
Federal Programs
:
FedRAMP
: Focus on cloud service providers and cloud technologies.
CMMC
: Targets controlled unclassified information for defense industrial base organizations.
Core Components of an SSP
System Description
Business purpose and technical components (servers, workstations, databases, etc.).
System Boundary
Components within the security boundary, typically documented with a network diagram.
Includes hardware and software inventory.
System Interconnections
Systems interacting with the scoped system (authentication services, data transfer, etc.).
Data Elements
Types of data within the system/application, impacting required security controls.
User Types
General users (end users) and privileged users (administrators).
System Owner
Administrative owner responsible for the system's operational control and security.
Security Controls
Protections around the system, detailed in catalogs like NIST 853.
Security Controls
Derived from catalogs such as NIST 853.
Controls classified by family (e.g., access control, configuration management, physical/environmental controls).
Types of controls: technical, operational, managerial.
Can apply at different levels: organizational, system-specific.
Scoping SSPs
Application-Specific
: Documenting one system or a group at a low level.
Network Level
: Secure enclaves, including infrastructure components and multiple applications.
Organizational Level
: Program security controls applicable across the organization (physical controls, personnel security, etc.).
Important Considerations
System Boundary
: Defines the boundary and security controls, critical for successful SSP development.
System Interconnections
: Protocols, data types, and protections for external/internal data transit.
Resources
CMMC Profile Template
: Practices mapped against NIST 800-171 with input fields for documentation.
FedRAMP Program Management Office
: Guides and templates for starting SSP development.
Contact Information
Email
:
[email protected]
Follow on
: LinkedIn, Twitter
Subscribe
: For more cybersecurity topics
Conclusion
Reach out for questions and additional information.
📄
Full transcript