1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
2 years ago
15

NIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templa

tes for major application security plans, and provides detailed methods for assessing, designing, and implementing controls and plans for applications of varying size.
Social Studies
1 answer:
Arlecino [84]2 years ago
4 0

Answer:

<u><em>The answer is</em></u>: <u>True.</u>

Explanation:

<u>Information System Security Plan Template </u>

<u>Guide for Developing Security Plans for Federal Information Systems </u>

1. Information System Name/Title:

• Unique identifier and name given to the system.

2. Information System Categorization:

• Identify the appropriate FIPS 199 categorization.

LOW MODERATE HIGH

3. Information System Owner:

• Name, title, agency, address, email address, and phone number of person who

owns the system.

4. Authorizing Official:

• Name, title, agency, address, email address, and phone number of the senior

management official designated as the authorizing official.

5. Other Designated Contacts:

• List other key personnel, if applicable; include their title, address, email address,

and phone number.

6. Assignment of Security Responsibility:

• Name, title, address, email address, and phone number of person who is

responsible for the security of the system.

7. Information System Operational Status:  

• Indicate the operational status of the system. If more than one status is selected,

list which part of the system is covered under each status.

Operational Under

Development

Major

Modification

8. Information System Type:

• Indicate if the system is a major application or a general support system. If the

system contains minor applications, list them in Section 9. General System

Description/Purpose.

Major

Application

General Support  

System

9. General System Description/Purpose

• Describe the function or purpose of the system and the information processes.

10. System Environment

• Provide a general description of the technical system. Include the primary  hardware, software, and communications equipment.

11. System Interconnections/Information Sharing

• List interconnected systems and system identifiers (if appropriate), provide the  system, name, organization, system type (major application or general support  system), indicate if there is an ISA/MOU/MOA on file, date of agreement to  interconnect, FIPS 199 category, C&A status, and the name of the authorizing  official.

System

Name

Organization Type Agreement

(ISA/MOU/MOA)

Date FIPS 199

Category

C&A  

Status

Auth.

Official

12. Related Laws/Regulations/Policies

• List any laws or regulations that establish specific requirements for the

confidentiality, integrity, or availability of the data in the system.

13. Minimum Security Controls

Select the appropriate minimum security control baseline (low-, moderate-, high-impact)  from NIST SP 800-53, then provide a thorough description of how all the minimum  security controls in the applicable baseline are being implemented or planned to be  implemented. The description should contain: 1) the security control title; 2) how the  security control is being implemented or planned to be implemented; 3) any scoping  guidance that has been applied and what type of consideration; and 4) indicate if the  security control is a common control and who is responsible for its implementation.

14. Information System Security Plan Completion Date: _____________________

• Enter the completion date of the plan.

15. Information System Security Plan Approval Date: _______________________

• Enter the date the system security plan was approved and indicate if the approval

documentation is attached or on file.  

<u> The following sample has been provided ONLY as one example</u>. Agencies may be using other formats and choose to update those to reflect any existing omissions based on this guidance. This is not a mandatory format; it is recognized that numerous agencies and information security service providers may have developed and implemented various approaches for information system security plan development and presentation to suit their own needs for flexibility.  

<u><em>The answer is</em></u>: <u>True.</u>

You might be interested in
What does Substantial mean
Ahat [919]

Answer:

joe mama

Explanation:

5 0
3 years ago
Read 2 more answers
Daniel is nervous about his speech, so he decides to memorize it. He has a strong memory, and he spends days learning his speech
irina [24]

Answer: the correct answer is they can fail if a speaker's memory fail

Explanation:

Often times, students that have to give a speech become nervous and have a bad performance since memory might fail. This is the case of Daniel.

4 0
3 years ago
Paano nagwakas ang pabulang ang maya at ang hipon
Ronch [10]

Answer:

Please speak in English

6 0
3 years ago
Why do you think an oval is a better shape for a race track than a rectangle
jarptica [38.1K]
Turning corners in a car takes longer, and all of the cars wouldn't go as smoothly because you need to slow down some to turn a corner. Since racetracks are ovals the drivers just need to turn, which you don't really need to slow down for.
8 0
3 years ago
Read 2 more answers
when ransom is told to go to oyarsa, he eventually decides to go. when ransom submits in obedience, does he surrender his free w
Akimi4 [234]

Ransom makes a free choice to travel to Oyarsa when he submits in obedience; he is not giving up his free will in doing so.

<h3>What is meant by OBEDIENCE?</h3>

It simply means hearing God's word and acting upon it. It implies that we should obey God's commands and submit to his will. It happens when we fully submit to His authority and base all of our decisions and deeds on his word.

<h3>What does obedience have to offer?</h3>

Children learn to take into account others' needs as they learn obedience. They develop a little less self-centeredness. They develop the ability to fit into other people's agendas. They pick up how to defer to authority. To be obedient, one must learn to carry out requests.

To know more about obedience visit :

brainly.com/question/29031144

#SPJ4

7 0
10 months ago
Other questions:
  • When interpreting confidence intervals when there are three or more means, if the intervals overlap such that the sample mean of
    14·1 answer
  • The five themes of geography include___ and___
    15·2 answers
  • Why is North Korea launching missiles towards the U.S?
    14·2 answers
  • Which challenges did the Lords Proprietors face in the late 1670s, as demonstrated by Culpeper’s Rebellion? Check all that apply
    15·1 answer
  • Which type of bridge is a flat structure that rests on two piers?
    5·1 answer
  • What career paths are best to take with physical science and Mathematics?
    5·1 answer
  • The greek city-state of athens is best known for developing which concept
    5·2 answers
  • Which event marked the only time the War Measures Act was used peacetime?
    9·1 answer
  • what university rely mainly on tuition, fees and private sources of funding and private donations can sometimes provide generous
    10·1 answer
  • Social cognition is an area of social psychology that studies
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!