Test 2015-01-15-1052 ([project acronym not provided]) [project id not provided] System Security Plan



Yüklə 1,74 Mb.
səhifə26/26
tarix09.01.2019
ölçüsü1,74 Mb.
#94342
1   ...   18   19   20   21   22   23   24   25   26

21.0 Plan Approval


We have reviewed the Security Plan for Test_2015-01-15-1052 and have made the determination that the security requirements and security controls selected for this system are in fact adequate to satisfy the security objectives of confidentiality, integrity, and availability based on the identified security impact level for Test_2015-01-15-1052

[INFORMATION SYSTEM OWNER] [Date]

{Insert System Owner signature block}

[COMPONENT CISO/ISSM] [Date]

{Insert Component CISO/ISSM signature block}

[AUTHORIZING OFFICIAL] [Date]



{Insert Authorizing Official signature block}

Acronyms





AC

Access Control

AES

Advanced Encryption Standards

AO

Authorizing Official

ARB

Acquisition Review Board

AT

Awareness and Training

ATO

Authority to Operate

AU

Audit and Accountability

BI

Background Investigation

BIA

Business Impact Assessment

BLSR

Baseline Security Requirements

CA

Certificate Authority

CA

Certification, Accreditation, and Security Assessments

CCB

Change Control Board

CFO

Chief Financial Officer

CI

Counter-Intelligence

C-I-A

Confidentiality, Integrity, and Availability

CIO

Chief Information Officer

CISID

Chief, Internal Security and Investigations Division

CISO

Chief Information Security Officer

CM

Configuration Management

CMG

Core Management Group

CMP

Configuration Management Plan

CONOPS

Concept of Operations

COOP

Continuity of Operations Planning

COOP

Continuity of Operations Plan

COTS

Commercial off the Shelf

CP

Certificate Policy

CP

Contingency Plan

CP

Contingency Planning

CPIC

Capital Planning and Investment Control

CPS

Certificate Practices Statement

CRE

Computer-Readable Extract

CRL

Certificate Revocation List

CSIRC

Computer Security Incident Response Center

CUI

Control Unclassified Information

DES

Digital Encryption Standards

DHS

Department of Homeland Security

DNSSE

Domain Name System Security Extensions

DoD

Department of Defense

DoS

Department of State

DoT

Department of Treasury

EA

Enterprise Architecture

EAB

Enterprise Architecture Board

EO

Executive Order

EOC

Enterprise Operations Center

FBCA

Federal Bridge Certification Authority

FDCC

Federal Desktop Core Configuration

FICAM

Federal Identity, Credentialing, and Access Management

FIPS

Federal Information Processing Standard

FISMA

Federal Information Security Management Act

FOUO

For Official Use Only

FPKI PA

Federal PKI Policy Authority

FTP

File Transfer Protocol

FYHSP

Future Years Homeland Security Program

GSA

General Services Administration

GSS

General Support System

HIPAA

Health Insurance Portability and Accountability Act

HSAR

Homeland Security Acquisition Regulations

HSPD

Homeland Security Presidential Directive

HVAC

Heating, Ventilation and Air Conditioning

IA

Identification and Authentication

IA

Information Assurance

IATO

Interim Authority to Operate

ICAM

Identity, Credentialing, and Access Management

IDS

Intrusion Detection System

IOD

Object identifier

IR

Infrared Response

IR

Incident Response

IRB

Investment Review Board

ISA

Interconnection Security Agreement

ISO

Information Security Office

ISSO

Information System Security Officer

ISVM

Information System Vulnerability Management

IT

Information Technology

JWICS

Joint Worldwide Intelligence Communications System

LAN

Local Area Network

LE

Law Enforcement

LMR

Land Mobile Radio

MA

Maintenance

MA

Major Application

MBI

Minimum Background Investigation

MBI

Minimum Background Investigation

MD

Management Directive

MD

Management Directive

MMS

Multimedia Messaging Service

MMS

Multimedia Messaging Service

MP

Media Protection

MP

Media Protection

NIAP

National Information Assurance Partnership

NIAP

National Information Assurance Partnership

NIST

National Institute of Standards and Technology

NOC

Network Operations Center

NSA

National Security Agency

OCIO

Office of the Chief Information Officer

OIG

Office of Inspector General

OIS

Office of Information Security

OMB

Office of Management and Budget

OPA

Office of Public Affairs

OPM

Office of Personnel Management

OTAR

Over-The-Air-Rekeying

PA

Policy Authority

PBX

Private Branch Exchange

PCS

Personal Communications Services

PDA

Personal Digital Assistant

PE

Physical and Environmental Protection

PED

Portable Electronic Device

PEP

Policy Enforcement Point

PHI

Protected Health Information

PIA

Privacy Impact Assessment

PII

Personally Identifiable Information

PIN

Personal Identity Number

PIRT

Privacy Incident Response Team

PIV

Personal Identity Verification

PKI

Public Key Infrastructure

PKI PA

PKI Policy Authority

PKI PM

PKI Management Authority

PL

Planning

PM

Program Manager

PM

Program Manager

PNS

Protected Network Services

POA&M

Plan of Action and Milestones

POC

Point of Contact

PPOC

Privacy Point of Contact

PS

Personnel Security

PSTN

Public Switched Telephone Network

PTA

Privacy Threshold Analysis

RA

Risk Assessment

RA

Registration Authority

RDP

Remote Desktop Protocol

RF

Radio Frequency

RFI

Radio Frequency Identification

RMS

Risk Management System

SA

System and Services Acquisition

SA

Security Architecture

SAISO

Senior Agency Information Security Officer

SAN

Subject Alternative Name

SAOP

Senior Agency Official for Privacy

SAR

Security Assessment Report

SC

System and Communications Protection

SCDN

Homeland Secure Data Network

SCI

Sensitive Compartmented Information

SCO

Chief Security Officer

SELC

Systems Engineering Life Cycle

SI

System and Information Integrity

SLA

Service Level Agreement

SMS

Short Message Service

SOC

Security Operations Center

SOP

Standard Operating Procedure

SORN

System of Records Notice

SP

Security Plan

SP

Special Publication

SSH

Secure Shell

SSL

Secure Socket Layer

SSP

Shared Service Provider

TAF

TrustedAgent FISMA

TFPAP

Trust Framework Provider Adoption Process

TIC

Trusted Internet Connections

TOS

Terms of Service

TRM

Technical Reference Model

TS

Top Secret

US-CERT

United States Computer Emergency Readiness Team

USGCB

U.S. Government Configuration Baseline

VA

Vulnerability Assessment

VAT

Vulnerability Assessment Team

VoIP

Voice over Internet Protocol

VPN

Virtual Private Network

WLAN

Wireless Local Area Network

WPAN

Wireless Personal Area Network

WWAN

Wireless Wide Area Network




[Document classification not provided]




Yüklə 1,74 Mb.

Dostları ilə paylaş:
1   ...   18   19   20   21   22   23   24   25   26




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin