See System Security Plan.
Sources:
FIPS 200
under SECURITY PLAN
NIST SP 800-18 Rev. 1
under Security Plan
NIST SP 800-53 Rev. 5
NIST SP 800-53A Rev. 5
Formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.
Sources:
NIST SP 800-137
under System Security Plan
from
FIPS 200
NIST SP 800-30 Rev. 1
under System Security Plan
NIST SP 800-39
under System Security Plan
NISTIR 8170
under System Security Plan
Formal document that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements.
Sources:
NIST SP 800-12 Rev. 1
under System Security Plan
Formal document that provides an overview of the security requirements for the information system and describes the security controls in place or planned for meeting those requirements.
Sources:
NIST SP 800-128
under System Security Plan
NIST SP 800-18 Rev. 1
under System Security Plan
A formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.
Sources:
NIST SP 800-128
under information system security plan
NIST SP 800-37 Rev. 2
under information system security plan
from
OMB Circular A-130 (2016)
See information system security plan.
Sources:
NIST SP 800-37 Rev. 2
Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements.
See system security plan or information security program plan.
Sources:
CNSSI 4009-2015
from
NIST SP 800-18 Rev. 1
Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements.
See System Security Plan or Information Security Program Plan.
Sources:
NIST SP 800-30 Rev. 1
under Security Plan
Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements.
See System Security Plan or Information Security Program Plan.
Sources:
NIST SP 800-39
under Security Plan
Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements. See System Security Plan or Information Security Program Plan.
Sources:
NIST SP 800-137
under Security Plan
A formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements. The system security plan describes the system components that are included within the system, the environment in which the system operates, how the security requirements are implemented, and the relationships with or connections to other systems.
Sources:
NIST SP 800-53 Rev. 5
NIST SP 800-53A Rev. 5
Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements. The system security plan describes the system components that are included within the system, the environment in which the system operates, how the security requirements are implemented, and the relationships with or connections to other systems.
Sources:
NIST SP 800-53B
Formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.
Sources:
NIST SP 800-82r3
from
NIST SP 800-18 Rev. 1
Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements.
See System Security Plan.
Sources:
NISTIR 8170
under Security Plan