141765950HUD System Security Plan Template v.1P 20090518
141765950HUD System Security Plan Template v.1P 20090518
141765950HUD System Security Plan Template v.1P 20090518
TEMPLATE
“Date XX/XX/XXXX”
[SYSTEM NAME]
[Organization]
[DATE PREPARED]
Prepared by:
Preparing Organization
TABLE OF CONTENTS
SYSTEM SECURITY PLAN REVIEW/APPROVAL SHEET__________________________________iii
SYSTEM SECURITY PLAN REVIEW SHEET___________________________________________iv
SYSTEM SECURITY PLAN CHANGE INFORMATION PAGE_____________________________v
A1 SYSTEM IDENTIFICATION__________________________________________________1
A1.1 System Name/Title____________________________________________________________1
A1.2 Responsible Organization______________________________________________________1
A1.3 Information Contact(s)_________________________________________________________1
A1.4 Assignment of Security Responsibility____________________________________________2
A2 OPERATIONAL STATUS____________________________________________________2
A3 GENERAL DESCRIPTION/PURPOSE_________________________________________3
A4 SYSTEM ENVIRONMENT___________________________________________________3
A5 SYSTEM INTERCONNECTION/INFORMATION SHARING_____________________4
A6 SENSITIVITY OF INFORMATION HANDLED__________________________________5
A6.1 Applicable Laws or Regulations Affecting the System________________________________6
A6.2 General Description of Information Sensitivity______________________________________7
A6.3 Protection/Certification Requirements____________________________________________12
A7 RISK SUMMARY___________________________________________________________13
B1-B5 MANAGEMENT CONTROLS_________________________________________________14
B1 Risk Management___________________________________________________________15
B2 Review of Security Controls___________________________________________________16
B3 Life Cycle__________________________________________________________________17
B4 Authorize Processing (C&A)___________________________________________________19
B5 System Security Plan_________________________________Error! Bookmark not defined.
B6-B14 OPERATIONAL CONTROLS__________________________________________________20
B6 Personnel Security___________________________________________________________20
B7 Physical and Environmental Protection___________________________________________22
B8 Production, Input/Output Controls_______________________________________________25
B9 Contingency Planning________________________________________________________25
B10 Hardware and System Software Maintenance______________________________________30
B11 Data Integrity_______________________________________________________________32
B12 Documentation______________________________________________________________35
B13 Security Awareness, Training, and Education______________________________________36
B14 Incident Response Capability___________________________________________________36
B15-B17 TECHNICAL CONTROLS____________________________________________________38
B15 Identification and Authentication________________________________________________38
B16 Logical Access Controls______________________________________________________39
B17 Audit Trails________________________________________________________________43
Appendix A – [SYSTEM NAME] Rules of Behavior______________________________________A-1
INDEX __________________________________________________________________________B-1
System Owner:
Security Officer:
Security Reviewer:
This Security Plan has been updated and approved on the following dates to account for the latest
changes. This task will be completed at least annually.
The security plan is viewed as documentation of the structured process of planning adequate, cost-
effective security protection for a system. It reflects input from management responsible for the system,
including information owners, the system operator, the system security manager, and system
administrators. The system security plan delineates responsibilities and expected behavior of all
individuals who access the system.
The purpose of this security plan is to provide an overview of the security of the System Name and
describe the controls and critical elements in place or planned for, based on NIST Special Publication
(SP) 800-53, Recommended Security Controls for Federal Information Systems. Each applicable
security control has been identified as either in place or planned. This SSP follows guidance contained
in NIST Special Publication (SP) 800-18, Guide for Developing Security Plans for Information
Technology Systems.
This plan was developed by [identify team or individual who developed the plan] under the direction of
the [specify Entity Name manager for whom the work was performed]. This plan is based upon a review
of the environment, documentation, Federal, State, and Entity Name regulations/ guidance, and
interviews with the information system personnel conducted between dates. In addition to this System
Security Plan (SSP), [specify other security documentation developed as part of the same task; e.g., “a
Risk Assessment (RA), Security Test and Evaluation (ST&E), and Plan of Action and Milestones
(POA&M) have been developed under this task”].
Documented in this plan are findings that indicate that there are weaknesses in System Name security
controls that need to be corrected. These findings are summarized as follows:
To permit the system to operate on the basis of minimum Entity Name security requirements being met,
the system owner should take action to implement planned corrective actions specified in this security
plan as rapidly as resources permit.
Example:
System Owner
Jane Roe
Director, Information Resource Management Office
Corporation Name
451 7th Street S.W.,
Washington, DC 20410
202-708-1234
ima.pony@abc.Entity.gov
You may also want to consider sending a memorandum from the organizational manager (or equivalent)
to the person (or persons) identified in the SSP as responsible for security to officially confirm their
appointment. If a memorandum is done, be sure to include a signed copy with the SSP.
The designated person(s) responsible for the security of the system has been assigned responsibility in
writing to ensure that the “System Name” has adequate security and is knowledgeable of the
management, operational, and technical controls used to protect the system.
Example:
Information System Security Officer
Albert Einstein
Corporation Name
Office of ABC
451 7th Street S.W.,
Washington, DC 20410
202-708-1234
albert.einstein@abc.Entity.gov
A2 OPERATIONAL STATUS
Discussion: Indicate whether the system is operational, under development (or acquisition), or
undergoing a major modification. Include date of operation, expected implementation, or completion
of modification. In this section discuss: the history of the system; the date the system became or will
become operational; if the system is undergoing modification; and all other pertinent information. All
milestones until operational status should be stated. If the system is about to go through a major
revision, all milestones along the way should be listed as well.
Example: The ABC LAN is currently in the operational and maintenance phase. Updates and changes
to the ABC LAN are expected throughout the fiscal year. There are currently no envisioned alterations
to the ABC LAN that would severely affect its operational status during updates and changes to the
A3 GENERAL DESCRIPTION/PURPOSE
Discussion: Present a brief description (one to three paragraphs) of the function and purpose of the
system (e.g., economic indicator, network support for an organization, business census data analysis, and
crop reporting support). Be sure to include the type(s) of information that the “System Name” processes.
If the system is a general support system, list all applications supported by the general support system.
Specify if the application is or is not a major application and include unique name/identifiers, where
applicable. Describe each application's function and the information processed. Include a list of user
organizations, whether they are internal or external to the system owner’s organization, and a general
description of the type of information and processing provided. Request information from the
application owners (and a copy of the security plans for major applications) to ensure their requirements
are met.
Example: The ABC LAN is the communication system, which is designed to facilitate the services and
resources needed to support the operations of ABC’s users. The ABC LAN supports the following
applications:
A4 SYSTEM ENVIRONMENT
Discussion: Provide a brief (one-three paragraphs) general description of the technical system. Include
any environmental or technical factors that raise special security concerns, such as:
The system is connected to the Internet;
It is located in a harsh or overseas environment;
Software is rapidly implemented; The software resides on an open network used by the general
public or with overseas access;
Describe the primary computing platform(s) used (e.g., mainframe, desktop, Local Area Network (LAN)
or Wide Area Network (WAN)). Include a general description of the principal system components,
including hardware, software, and communications resources. Provide server names and IP addresses.
Discuss the type of communications included (e.g., dedicated circuits, dial circuits, public data/voice
networks, Internet). Describe controls used to protect communication lines in the appropriate sections of
the security plan.
Include any security software protecting the system and information. Describe in general terms the type
of security protection provided (e.g., access control to the computing platform and stored files at the
operating system level or access to data records within an application). Include only controls that have
Example: The ABC system is housed in a government owned building in Washington, DC. The entire
building is occupied by the Corporation Nameand contractor personnel and is not open to the general
public. The ABC LAN operates Microsoft NT, version 4.0, and workstations run Windows 95. The
security software protecting all system resources is the built in security of Microsoft Windows NT. The
ABC LAN supports all office automation applications for ABC. The ABC LAN has dial up lines from
each subordinate site. Users are required to be authenticated with user ID and password before access is
granted to the network. Additionally, a personal firewall and up-to-date antivirus software is installed on
each user’s machine prior to the laptop being issued for travel.
In this section, provide the following information concerning the authorization for the connection to
other systems or the sharing of information:
Example: The ABC LAN is interconnected with the ENTITY XYZ backbone for Internet and Intranet
access. The ABC LAN is a level II system and the information within the ABC LAN is currently shared
with other ENTITY activities, and other Federal agencies. MOUs dated 12 Oct 02, exist that have been
approved by legal and are on file with the ISSO. The Rules of Behavior have to be read, understood, and
signed by each user.
Analysts/programmers who will use it to help design appropriate security controls; Internal and external
auditors evaluating system security measures; and managers making decisions about the reasonableness
of security countermeasures. Sensitivity levels range from low to high based on the type(s) of
information processed. Exhibit 1 below summarizes the sensitivity levels, while Exhibit 2 provides
examples of the types of information that fall into each sensitivity category. Determine the sensitivity
level of the information based on the information in Exhibits 1 and 2. Indicate the overall system
sensitivity level by using the highest data sensitivity level from the table. These sensitivity levels also
apply to systems under development. Include a statement of the estimated risk and magnitude of harm
resulting from the loss, misuse, or unauthorized access to or modification of information in the system.
The description must contain information on applicable laws, regulations, and policies affecting the
system and a general description of sensitivity. The nature of the information sensitivity and criticality
must be described in this section.
Sensitivity
Description of Sensitivity Level
Level
Could result in LOSS OF MAJOR TANGIBLE ASSETS or resources, including posing a threat
to human life
Moderate Would have an ADVERSE IMPACT on MA or GSS missions, functions, image, or reputation,
such that the impact would place the MA at a significant disadvantage, or
Example: The ABC LAN is the primary communications network that supports ABC’s users in their
day-to-day operations. This network is continuously used during business and non-business hours. The
confidentiality, integrity and availability of the ABC LAN is critical, i.e., ensuring that data is only
received by the person that it is intended for, that data is not subject to unauthorized or accidental
alterations, and that the resources are available when needed.
See the NIST Computer Security Division’s Computer Security Resource Clearinghouse (CSRC) Web
site for additional information (http://csrc.nist.gov). CSRC contains information on a wide variety of
computer security resources, including a list of applicable laws and regulations.
Example:
Information
Explanation and Examples Protection Requirements
Category
Confidentiality – The system contains
personal information relating to payroll
processing for approximately 175
Information related to personnel, medical, personnel.
and similar data. Includes all information Integrity – The accuracy of employee
covered by the Privacy Act of 1974 (e.g., payroll transactions is based upon the
salary data, social security information, integrity of personal data used by the
Information passwords, user identifiers (IDs), EEO, system.
about persons personnel profile (including home address Availability – Non-availability of the
and phone number), medical history, system would result in a noticeable
employment history (general and security impact on “Entity Name” missions,
clearance information), and arrest/criminal functions, image, or reputation.
investigation history). However, the impact is diminished since
operations can be resumed by manual
means in degraded form for an extended
period.
EXAMPLE
A7 RISK SUMMARY
The results of the System Name Risk Assessment indicated that the risks to system resources in the areas
of Management, Operational, and Technical controls are as follows:
Technical Controls: The most significant technical control risks include [summarize
weaknesses in technical controls here, e.g., “the failure to implement a log-on banner; failure to
detect unauthorized access attempts through editing; and the lack of periodic vulnerability
scanning.”]
Risks in areas such as natural, environmental, human intentional and human unintentional threats were
assessed. The assessment found that identified risks could be fully mitigated through the implementation
of security controls specified in Table 5-1 of the System Name Risk Assessment.
Figure 5.1 above summarizes risks identified in the [System Name] Risk Assessment. Number
vulnerabilities found in System Name controls are ranked as low, medium and/or high risk. Therefore,
System Name is categorized as having a low, medium or high level of risk.
For SCL-1 (Low Impact) systems the Controls Identification section will consist of the following
Controls Status Summary Table and a completed Minimum Security Baseline Assessment.
For SCL-1 systems the completed Minimum Security Baseline Assessment here and disregard (delete)
Sections B1-B17 below.
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
B2 Planning (PL)
The status of security planning controls for the [System Name] is as indicated in the following table:
[Use the Not Applicable column to identify the controls applicable to the system. A=all
systems; MH=Moderate and High systems; H=high systems only. Mark those that are not
applicable as “NA”; do not delete them.]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
Control In Place
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
PE-7 (1) Visitor Control: The organization escorts visitors and monitors
visitor activity, when required.
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
sites.
Not Applicable
Description of Control
Planned
In Place
Control
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Planned
In Place
Control
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Planned
In Place
Control
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Planned
In Place
Control
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Planned
In Place
Control
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
B9 Maintenance (MA)
The status of maintenance controls for the [System Name] is as indicated in the following table:
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Description of Control
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Applicable
Planned
In Place
Control
Not
Number [Document how the control has been specifically implemented for the
system; describe actions that are planned to complete implementation]
Below is a template for writing Rules of Behavior (ROB) for your organization. National Institute of
Standards and Technology (NIST) Special Publication (SP) 800-18 recommends that the ROB be
included in the System Security Plan (SSP) as an appendix such as this.
1. Responsibilities
Discussion: In this section, you will need to describe what ROB are, why they are needed, what users
can expect, and the consequences for violating ROB. Sample language for completing this section is
provided below.
Sample Language:
It is recommended that every System Security Plan (SSP) to contain a Rules of Behavior (ROB). ROB
apply to the system users and list specific responsibilities and expected behavior of all individuals with
access to or use of the named information system. In addition, ROB outlines the consequences of non-
compliance and/or violations.
ROB is part of a complete program to provide good information security and raise security awareness.
ROB describes standard practices needed to ensure safe, secure, and reliable use of information and
information systems.
The ROB covers all government and non-government users of the named information systems. This
includes contract personnel and other funded users.
Penalties for non-compliance may include, but are not limited to, a verbal or written warning, removal of
system access, reassignment to other duties, demotion, suspension, reassignment, termination, and
possible criminal and/or civil prosecution.
Discussion: In this section you will list the ROB measures that will apply to application users and the
organization in general. Section 3.1 lists the most common and minimal set of ROB as recommended by
NIST 800-18. Section 3.2 lists other ROB that may apply to your organization. Section 2h includes
ROB for system administrators. Each section is discussed in detail below.
Note: The sample ROB that appear below are very restrictive. It is understood that certain
organizations allow flexibility (i.e. computers may be used on a limited basis for personal use) and
therefore ROB should be adjusted accordingly. In addition, not all samples listed below will apply to
Discussion: The following categories are the most common ROB. These categories are listed in NIST
800-18 as the “minimal” recommended set of ROB that an organization should have. Sample language
for each category is provided below.
Sample Language:
1. Passwords
1. Passwords should be a minimum of eight characters, and be a combination of letters, numbers
and special characters (such as *#$ %). Dictionary words should not be used.
2. Passwords will be changed at least every 90 days and should never be repeated. Compromised
passwords will be changed immediately.
3. Passwords must be unique to each user and must never be shared by that user with other users.
For example, colleagues sharing office space must never share each other’s password to gain
system access.
4. Users who require multiple passwords should never be allowed to use the same password for
multiple applications.
5. Passwords must never be stored in an unsecured location. Preferably, passwords should be
memorized. If this is not possible, passwords should be kept in an approved storage device, such
as a Government Services Administration Security Container. If they are stored on a computer,
this computer should not be connected to a network or the Internet. The file should be
encrypted.
B. Encryption
1. Extremely sensitive data should be encrypted prior to transmission.
2. The sensitivity of the information needing protection, among other considerations, determines
the sophistication of the encryption technology. In most circumstances, only the most sensitive
or compartmentalized information should be encrypted.
3. Files that contain passwords, proprietary, personnel, or business information, and financial data
typically require encryption before transmission, and should be encrypted while stored on the
computer’s hard disk drive.
4. Sensitive information that travels over wireless networks and devices should be encrypted.
1. Internet Usage
1. Downloading files, programs, templates, images, and messages, except those explicitly
authorized and approved by the system administrator, is prohibited.
2. Visiting websites including, but not limited to, those that promote, display, discuss, share, or
distribute hateful, racist, pornographic, explicit, or illegal activity is strictly prohibited.
3. Because they pose a potential security risk, the use of Web based instant messaging or
communication software or devices are prohibited.
4. Using the Internet to make non-work related purchases or acquisitions is prohibited.
D. Email
1. Except for limited personal use, non-work-related e-mail is prohibited. The dissemination of e-
mail chain letters, e-mail invitations, or e-mail cards is prohibited.
2. E-mail addresses and e-mail list-serves constitute sensitive information and are never to be sold,
shared, disseminated, or used in any unofficial manner.
3. Using an official e-mail address to subscribe to any non-work related electronically distributed
newsletter or magazine is prohibited.
1. Users may dial into the network remotely only if pre-approved by the system administrator.
2. Users must be certain to log-off and secure all connections/ports upon completion.
3. Users who work from home must ensure a safe and secure working environment free from
unauthorized visitors. At no time should a “live” dial-up connection be left unattended.
4. Web browsers must be configured to limit vulnerability to an intrusion and increase security.
5. Home users connected to the Internet via a broadband connection (e.g. DSL or a cable-modem)
must install a hardware or software firewall.
6. No official material may be stored on the user’s personal computer. All data must be stored on a
floppy disk and then secured in a locked filing cabinet, locker, etc.
Discussion: Section 3 lists the most common ROB categories as recommended by NIST 800-18.
However, there are other ROB, which may apply to your organization. You will want to include these
rules here, in Section 3. Note: It is not necessary to begin a new section or to differentiate between the
types of rules (i.e. “most common” vs. “other”).
These additional ROB that may apply appear below.
1. Using system resources to copy, distribute, utilize, or install unauthorized copyrighted material
is prohibited.
2. Users who no longer require IT system access (as a result of job change, job transfer, or
reassignment of job responsibilities) must notify the system administrator.
3. When not in use, workstations must be physically secured. Users must also log-off or turn-off
the system.
5. Movable media (such as diskettes, CD-ROMs, Zip disks, and thumb drives) that contain
sensitive and/or official information must be secured when not in use.
6. Altering code, introducing malicious content, denying service, port mapping, engaging a
network sniffer, or tampering with another person’s account is prohibited.
7. If a user is locked out of the system, the user should not attempt to log-on as someone else.
Rather, the user should contact the system administrator.
Note: This section only applies to system administrators. If you are writing a ROB for system users, you
may skip this section and continue to Section 3.
Discussion: system administrators have a unique responsibility above and beyond that of regular users.
In addition to being regular system users, they also have special access privileges that regular users do
not have. Therefore, they need to be susceptible to additional ROB over and above the common user.
System User vs. System Administrator Option: You may find it easier to create two separate ROB
documents – one for system users and the other for system administrators. The system users ROB would
include sections 3.1 and 3.2 only, while the “system administrators” ROB would include sections 3.1-
3.3. Alternatively, you could create one ROB document noting that this section would only apply to
system administrators.
1. System administrators may only access or view user accounts with the expressed consent of
the user and/or management.
2. System administrators may not track or audit user accounts without the expressed consent of
the user and/or management.
3. System administrators must make every reasonable effort to keep the network free from
viruses, worms, Trojans, and unauthorized penetrations.
4. It is the system administrators’ responsibility to account for all system hardware and
software loaned to system users for the execution of their official duties.
3. Acknowledgment
Discussion: In this section, you will create a signature page. Prior to receiving authorization for system
access, every user should read and sign the ROB (this includes system administrators since they are also
“users” of the system). By signing the signature page, the user agrees to abide by the ROB and
understands that failure to do so might be grounds for disciplinary action.
Ensure that users retain a copy of their signed ROB for their records.
I have read and understand the Rules of Behavior governing my use of System Name and agree to
abide by them. I understand that failure to do so may result in disciplinary action being brought
against me.
User Signature_____________________________________________
Organization_______________________________________________
Date_____________________________________________________
Applicable Laws or Regulations Affecting the NIST Special Publication (SP) 800-26, Security
System...........................................................6 Self-Assessment Guide for Information
Audit Trails....................................................43 Technology...................................................vi
Authorize Processing (C&A)..........................19 Office of Management and Budget (OMB)
Availability....................................6, 7, 8, 10, 13 Circular A-130......................................vi, 4, 1
Computer Security Act of 1987........................vi Operational Controls.......................................20
Confidentiality...............................6, 7, 8, 10, 12 Operational Status.............................................2
Contact(s)..........................................................1 Password.......................................................2, 3
Data Integrity...................................................32 Personnel Security.........................................20
Description/Purpose..........................................3 Physical and Environmental Protection...........22
Documentation.................................................vi Rules of Behavior..................................5, 1, 3, 4
Encryption........................................................2 Security Controls................................vi, 5, 9, 12
Identification and Authentication....................38 Security Responsibility......................................2
Information Categories......................................7 Sensitivity............................................4, 6, 7, 12
Integrity.........................................6, 7, 8, 10, 13 System Environment.........................................3
Logical Access Controls..................................40 System Identification...................................1, 14
Management Controls.....................................15 System Interconnection/Information Sharing....4
Management of Federal Information Resources System Security Plan........................................vi
and Public Law 100-235...............................vi Technical Controls...........................................38
NIST Special Publication (SP) 800-18, Guide
for Developing Security Plans for
Information Technology Systems................vi