Security Plantemplate
Security Plantemplate
TABLE OF CONTENTS
EXECUTIVE SUMMARY
A. APPLICATION/SYSTEM IDENTIFICATION
-- Name
-- Title
-- Address
-- Phone Number
-- Fax Number
-- E-mail Address
-- Name
-- Title
-- Address
-- Phone Number
-- Fax Number
-- E-mail Address
-- Operational
-- Under Development
-- Undergoing a major modification
The sensitivity and criticality of the information stored within, processed by, or
transmitted by an application/system provides a basis for the value of the
application/system and is one of the major factors in risk management. A
description of the types of information handled by the application/system and an
analysis of the criticality of the information is required. This description and
analysis will assist in designing security controls, facilitating security audits, and
implementing security countermeasures.
B. MANAGEMENT CONTROLS
In this section, determine which phase(s) of the life cycle the application/system,
or parts of the application/system, are in. Identify how security has been handled
during each of the listed applicable life cycle phases.
• Initiation
• Development/Acquisition
• Implementation
• Operation/Maintenance
• Disposal
C. OPERATIONAL CONTROLS
In this section, provide a synopsis of the procedures that support the operations
of the application/system. Describe the controls used for the marking,
processing, storage, and disposal of input and output information and media as
well as the labeling and distribution procedures for information and media. The
controls used to monitor the installation of application/system software updates
should also be listed. Below is a sampling of topics that may be reported in this
section.
• Is there a help desk or group that offers advice and can respond to
security incidents in a timely manner? Are there procedures in place
documenting how to recognize, handle, report, and track incidents and/or
problems? Do these procedures outline how to categorize and prioritize
incidents?
• Are there procedures to ensure unauthorized individuals cannot read,
copy, alter, or steal printed or electronic information?
• Are there procedures for ensuring that only authorized users pick up,
receive, or deliver input and output information and media?
• Are there audit trails for receipt of sensitive inputs/outputs?
• Are there procedures for restricting access to output products?
• Is there internal/external labeling for sensitivity (e.g., Privacy Act,
Proprietary?)
• Is there external labeling with special handling instructions (e.g.,
log/inventory identifiers, controlled access, special storage instructions,
release or destruction dates)?
• Are there audit trails for inventory management?
• Is there a media storage vault or library containing physical, environmental
protection controls/procedures?
• Are there procedures for sanitizing electronic media for reuse?
• Are there procedures for controlled storage, handling, or destruction of
spoiled media or media that cannot be effectively sanitized for reuse?
• Are there procedures for shredding or other destructive measures for
hardcopy media when no longer required?
• Does the change control process require that all changes to the
application/system software be tested and approved before being put into
production?
• Are there procedures for testing and/or approving system components
(operating system, other system, utility, applications) prior to promotion to
production?
• Is test data live data or made-up data?
• Do test plans trace back to the original security requirements?
• Are test results documented?
C.7 Documentation
Documentation includes descriptions of the hardware and software, policies,
procedures, and approvals related to automated information security in the
application/system. Documentation should also include descriptions of user and
operator procedures, and backup and contingency activities.
D. TECHNICAL CONTROLS
Discuss the controls in place to authorize or restrict the activities of users and
personnel within the application/system. Describe hardware or software features
that are designed to permit only authorized access to or within the
application/system, to restrict users to authorized transactions and functions,
and/or to detect unauthorized activities (i.e., access control lists [ACLs]).
• How are access rights granted? Are privileges granted based on job
function?
• Describe the application/system's capability to establish an ACL or
register.
• Describe how users are restricted from accessing the operating system or
other application/system resources not required in the performance of
their duties.
• Describe controls to detect unauthorized transaction attempts by
authorized and/or unauthorized users. Describe any restrictions to prevent
users from accessing the application/system outside of normal work hours
or on weekends.
• Indicate after what period of user inactivity the application/system
automatically blanks associated display screens and/or disconnects
inactive users. After what period of user inactivity does the
application/system require the user to enter a unique password before
reconnecting?
• Indicate if encryption is used to prevent access to sensitive files as part of
the application/system access control procedures.
• Describe the rationale for electing to use or not use warning banners, and
provide an example if banners are used.
Appendix A
Sample Authorization to Process (ATP) Memo
MEMORANDUM
DATE:
Based on a careful review of the Application System XYZ Security Plan, I have
confirmed that Application/System XYZ meets the requirements of
_____________________information systems security programs. Therefore, I
authorize continued operation of Application/System XYZ under the following
restrictions:
[Name] __________________________________________
[Title] __________________________________________
Signature __________________________________________
[Name] __________________________________________
[Title] __________________________________________
Signature __________________________________________