1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
2 years ago
15

NIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templa

tes for major application security plans, and provides detailed methods for assessing, designing, and implementing controls and plans for applications of varying size.
Social Studies
1 answer:
Arlecino [84]2 years ago
4 0

Answer:

<u><em>The answer is</em></u>: <u>True.</u>

Explanation:

<u>Information System Security Plan Template </u>

<u>Guide for Developing Security Plans for Federal Information Systems </u>

1. Information System Name/Title:

• Unique identifier and name given to the system.

2. Information System Categorization:

• Identify the appropriate FIPS 199 categorization.

LOW MODERATE HIGH

3. Information System Owner:

• Name, title, agency, address, email address, and phone number of person who

owns the system.

4. Authorizing Official:

• Name, title, agency, address, email address, and phone number of the senior

management official designated as the authorizing official.

5. Other Designated Contacts:

• List other key personnel, if applicable; include their title, address, email address,

and phone number.

6. Assignment of Security Responsibility:

• Name, title, address, email address, and phone number of person who is

responsible for the security of the system.

7. Information System Operational Status:  

• Indicate the operational status of the system. If more than one status is selected,

list which part of the system is covered under each status.

Operational Under

Development

Major

Modification

8. Information System Type:

• Indicate if the system is a major application or a general support system. If the

system contains minor applications, list them in Section 9. General System

Description/Purpose.

Major

Application

General Support  

System

9. General System Description/Purpose

• Describe the function or purpose of the system and the information processes.

10. System Environment

• Provide a general description of the technical system. Include the primary  hardware, software, and communications equipment.

11. System Interconnections/Information Sharing

• List interconnected systems and system identifiers (if appropriate), provide the  system, name, organization, system type (major application or general support  system), indicate if there is an ISA/MOU/MOA on file, date of agreement to  interconnect, FIPS 199 category, C&A status, and the name of the authorizing  official.

System

Name

Organization Type Agreement

(ISA/MOU/MOA)

Date FIPS 199

Category

C&A  

Status

Auth.

Official

12. Related Laws/Regulations/Policies

• List any laws or regulations that establish specific requirements for the

confidentiality, integrity, or availability of the data in the system.

13. Minimum Security Controls

Select the appropriate minimum security control baseline (low-, moderate-, high-impact)  from NIST SP 800-53, then provide a thorough description of how all the minimum  security controls in the applicable baseline are being implemented or planned to be  implemented. The description should contain: 1) the security control title; 2) how the  security control is being implemented or planned to be implemented; 3) any scoping  guidance that has been applied and what type of consideration; and 4) indicate if the  security control is a common control and who is responsible for its implementation.

14. Information System Security Plan Completion Date: _____________________

• Enter the completion date of the plan.

15. Information System Security Plan Approval Date: _______________________

• Enter the date the system security plan was approved and indicate if the approval

documentation is attached or on file.  

<u> The following sample has been provided ONLY as one example</u>. Agencies may be using other formats and choose to update those to reflect any existing omissions based on this guidance. This is not a mandatory format; it is recognized that numerous agencies and information security service providers may have developed and implemented various approaches for information system security plan development and presentation to suit their own needs for flexibility.  

<u><em>The answer is</em></u>: <u>True.</u>

You might be interested in
Why did the colonists in South Carolina appoint a general committe of 99 and 1774
bagirrra123 [75]

During the period before the Civil War, South Carolina was not only the wealthiest state but also the one that was alienated from the rest. On July 6th,  1774, at a general meeting, members of the South Carolina's society decided to create "The committee of 99", that  was formed by 5 delegates and who main task was to take control of the government of the colony.

The committee of 99 was created as a response of the colonists against the lack of representation that the colony had in America. They wanted to formally declare the shift that the colonists were making from the British Government and to start  governing themselves.


5 0
3 years ago
Which European country was considered the leader of European imperialism/ colonization?
Alborosie

Answer:During the Age of Discovery during the 15th century, Portugal and Spain were the leaders. Those two countries were colonizing much of South America, Africa, and some parts of Southern Asia. Later on, France was one of the bigger colonization countries.

Explanation:

make me brainlest

6 0
3 years ago
What would this be Please hurry up
zaharov [31]

Osiris is the Egyptian god of the living and dead

4 0
3 years ago
The MAIN function of political parties in the United States is to A) narrow down choices for citizens voting in elections. B) en
mezya [45]

The MAIN function of political parties in the United States is to:

D) help people with similar political ideas express their views.

5 0
3 years ago
What are the effect of paying higher bride wealth price​
Doss [256]

Answer:

vvghbvcccvhnbbhhhhhhhhhhhhh

5 0
2 years ago
Other questions:
  • In the Betsy Ross flag, each star represented____________________.
    5·2 answers
  • What did hitler do wrong
    7·1 answer
  • The concept that the people of a nation have a right to overthrow a government that acts against their common interests is knows
    14·1 answer
  • Olivia is married and has two children. She works full-time and struggles to get off of work early to make it to her kids' schoo
    5·2 answers
  • What are the positives and negatives of having a social structure?
    8·1 answer
  • What term is used to describe a political entity located within a geographic boundary whose population shares a sense of culture
    9·1 answer
  • Why is television more effective than radio in influencing public opinion?
    11·1 answer
  • There are”dash” main cataracts,or waterfalls, along the Nile River.
    7·1 answer
  • _____ refers to the process of transforming information into a form that can be stored in memory.
    15·1 answer
  • __________ is a trace mineral that plays a very important role in helping teeth develop and become strong so they are better abl
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!