Date Published: June 4, 2025
Comments Due: July 30, 2025
Email Comments to:
[email protected]
The system security plan, system privacy plan, and cybersecurity supply chain risk management plan–collectively referred to as system plans– consolidate information about the assets and individuals being protected within an authorization boundary and its interconnected systems. System plans serve as a centralized point of reference for information about the system and tracking risk management decisions to include data being created, collected, disseminated, used, stored, and disposed; individuals responsible for system risk management efforts; details about the environment of operation, system components, and data flows internally and externally; and controls in planned and in place to manage risk.
NIST Special Publication 800-18r2 focuses on the development of system plans that address system-level security, privacy, and CSCRM requirements that may derive from enterprise, organization, and mission/business process requirements.
The major changes for this revision include:
Supplemental materials include system plan example outlines; updated roles and responsibilities associated with system plan development.
The public comment period is open through July 30, 2025. We encourage you to use this comment template and email it to [email protected].
NOTE: A call for patent claims is included in the front matter of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy – Inclusion of Patents in ITL Publications.
None selected
Publication:
https://doi.org/10.6028/NIST.SP.800-18r2.ipd
Download URL
Supplemental Material:
Security Plan Example Outline (docx)
Privacy Plan Example Outline (docx)
C-SCRM Plan Example Outline (docx)
System Plan-related Roles and Responsibilities (docx)
Comment template (xlsx)
NIST Risk Management Framework
Document History:
06/04/25: SP 800-18 Rev. 2 (Draft)
access authorization, authentication, cybersecurity supply chain risk management, planning, privacy, risk management
Laws and RegulationsFederal Information Security Modernization Act, OMB Circular A-130