Example NCP SSP en
Example NCP SSP en
Example NCP SSP en
SCOPING:
Name of System: [name of contractor’s internal, unclassified information system the SSP addresses]
DUNS #: [contractor’s DUNS #]
Contract #: [contractor’s contract # or other type of agreement description]
CAGE Code #: [contractors CAGE code #]
DISTRIBUTION: [list who this SSP is distributed to (e.g., contracting official, prime contractors, etc.)]
A key concept to keep in mind with the SSP is that it should be complete enough for a reasonable person to pick up, read through
and understand the following information:
What CUI is in regards to the company’s operations.
Where CUI is stored, transmitted or processed.
What controls are in place to protect CUI as it is stored, transmitted and processed.
Any deficiencies that exist in protecting CUI, if applicable.
Remediation plans address known deficiencies, if applicable.
Step 2 – Start filling out the information you have available, using the examples as guidance, where applicable.
Step 4 – Work through Annex 1 to provide evidence of how each of the applicable CUI and Non-Federal Organization (NFO)
controls are being addressed.
Step 5 – For any CUI or NFO control that is not addressed, add an entry in the accompanying Plan of Action & Milestones
(POA&M) template
Documentation Notes:
Text in BLACK are standard template text that are expected to be included in the SSP and should not be deleted unless
necessary.
Text in RED are helpful instructions that need to be deleted as sections are completed.
Text in BLUE are examples that need to be deleted as sections are completed.
Prepared By
[Name]
[Email Address]
[Phone #]
[Department]
Revision History
The objective of the System Security Plan (SSP) document is to have a simple, easy-to-reference document that covers pertinent
information about the Controlled Unclassified Information (CUI) environment. This is a “living document” that is meant to be
updated as conditions change.
The goal of this document is simple - anyone not familiar with the CUI environment should be able to read it and gain a fundamental
understanding of the systems involved, the risks, and the security controls required to maintain an acceptable level of security.
Essentially, this document provides a centralized repository for knowledge that is specific to the CUI environment and its applicable
security controls. The SSP reflects input from those responsible for the systems that make up the CUI environment, including
information owners, system operators, and other stakeholders.
Example:
Contract XXXXXX defines CUI as schematic diagrams that are pertinent to the XYZ project.
Key Stakeholders
CUI protection is a combined effort from the following stakeholders:
Stakeholder 1, Position
Stakeholder 2, Position
Stakeholder 3, Position
Example:
It is sometimes worthwhile to include an organization chart, since this can assist with problem escalations.
CIO
Networking
Team 1 Team 2
Technology
Technology
Infrastructure
Appendix A (Data Protection Considerations) provides the methodology for how data is classified in terms of data sensitivity and
criticality to the CUI environment.
Statutory Requirements
[fill-in applicable statutory requirements]
Regulatory Requirements
[fill-in applicable regulatory requirements]
Contractual Requirements
[fill-in applicable contractual requirements]
This section contains a detailed topology narrative and graphic shall that clearly depicts the system environment, including system
boundaries, system interconnections, and key components.
Instruction: This does not require depicting every device, but would include an instance of operating systems in use, virtual and
physical servers (e.g., file, print, web, database, application), as well as any networked workstations, firewalls, routers, switches,
copiers, printers, lab equipment, etc. If components of other systems that interconnect/interface with this system need to be shown
on the diagram, denote the system boundaries by referencing the security plans or names and owners of the other system(s) in the
diagram. Include or reference (e.g., to an inventory database or spreadsheet) a complete hardware and software inventory,
including make/model/version and maintenance responsibility.
Delete this and all other instructions from your final version of this document.
Operating Model
Operating Environment Where CUI Exists (check all that apply)
☐ Public Cloud Cloud services and infrastructure supporting multiple organizations and clients
Cloud services and infrastructure dedicated to a specific organization and no other
☐ Private Cloud
clients
☐ Data Center Company-owned & operated datacenter.
Explain: (e.g., cloud services and infrastructure that provides private cloud for secured
☐ Hybrid
applications and data where required and public cloud for other applications and data)
☐ Dispersed Endpoints CUI can be found on workstations and other endpoints.
☐ Other Explain:
High-Level Overview of Where CUI Is Stored, Transmitted or Processed (check all that apply)
☐ End User Workstations End user workstations (e.g., desktops & laptops)
☐ Mobile Devices Mobile devices (e.g., tablets or smartphones)
☐ Industrial Control System (ICS) Devices that control manufacturing processes
☐ Internal application/service Internal application (e.g., ERM, SAP, ticket system, change control, etc.)
☐ Software as a Service (SaaS) Web-based applications (e.g., Google Apps, Salesforce, GoToMeeting, WebEx)
☐ Platform as a Service (PaaS) Web-based major applications (e.g., Azure Cloud Services)
☐ Infrastructure as a Service (IaaS) Cloud environments (e.g., Azure, AWS, Rackspace)
☐ Other Explain:
Example:
Appendix B (Hardware and Software Inventory), provides a breakdown of assets that comprise the CUI environment in both the
production and development instances.
Appendix C (Interconnectivity Documentation), provides a detailed description of ports, protocols and services, in use within the
CUI environment.
Example:
Vendor accounts will be created in the ACME instance and pushed to the XXXXX instance. Only one account per vendor will be allowed.
The vendor account will be inactivated when the vendor submits their documentation.
The two instances of XXXXX will use different methods for user identification and authentication, since the XXXXX-hosted instance
will be externally accessible to vendors.
ACME Instance
User Names: AD integration
Passwords: AD integration
Account Reviews: Tied into AD
Account Deactivation: Tied into AD
XXXXX Instance
User Names:
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: Local XXXXX account (hosted instance only)
Passwords:
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: TBD
Account Reviews:
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: TBD
Account Deactivation: Tied into AD
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: TBD
Example:
XYZ is designed with two distinct instances, running in two different environments:
Internal XXXXX instance that is housed in ACME’s datacenter (Datacenter 1); and
Hosted XXXXX instance in Microsoft’s Azure private cloud.
[add network diagram here - if you do not have a network diagram, you can work with https://www.network-diagrams.com to
obtain a quality network diagram and data flow diagram for your CUI environment (see below for an example)]
Provide a diagram that portrays the system boundaries and all applicable connections and components, including the means for
monitoring and controlling communications at the external boundary and at key internal boundaries within the system.
Address all components and managed interfaces of the information system authorized for operation (e.g., routers, firewalls).
Formal names of components as they are known by the project team in functional specifications, configuration guides, other
documents and live configurations shall be named on the diagram and described. Components identified in the Boundary diagram
should be consistent with the Network diagram and the inventory(ies). Provide a key to symbols used. Ensure consistency between
the boundary and network diagrams and respective descriptions
If necessary, include multiple network diagrams.
Delete this and all other instructions from your final version of this document.
Operational Phase
The CUI environment is currently:
Operational Status
☐ Operational CUI is being used by systems in a production environment.
☐ Under Development CUI is being used by systems in a developmental / testing environment.
☐ Major Modification CUI systems are undergoing a major change, development, or transition.
☐ Other Explain:
The dates planned and dates reached for each phase of the System Development Lifecycle (SDLC) and Control Validation Testing
(CVT) milestones:
Milestones
[Enter a narrative about the planned milestones planned for the life of the systems that make up the CUI environment]
Example:
XYZ is currently in the operate phase. Updates and changes to XYZ is expected throughout the fiscal year. There are currently no
envisioned alterations to XYZ that would severely affect its operational status during updates and changes to the system
environment. XYZ will be undergoing major modification during the course of FY2018, including network engineering, security
engineering, and systems engineering
INSTRUCTIONS: All milestones about operational status should be stated. If the system is about to go through a major revision, all
milestones along the way should be listed as well.
Delete this and all other instructions from your final version of this document.
The SSP consists of the applicable NIST SP 800-53 rev4 controls, as mapped in NIST SP 800-171 Appendix D (CUI controls) and
Appendix E (NFO controls).
3.1.1 (AC.L1-3.1.1) Limit system access to authorized users, processes acting on behalf of authorized users, or devices (including
other systems).
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-02
Supporting procedure: P-AC-02
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]
3.1.2 (AC.L1-3.1.2) Limit system access to the types of transactions and functions that authorized users are permitted to execute.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]
3.1.3 (AC.L2-3.1.3) Control the flow of CUI in accordance with approved authorizations.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-03
Supporting procedure: P-AC-03
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]
3.1.4 (AC.L2-3.1.4) Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]
3.1.5 (AC.L2-3.1.5) Employ the principle of least privilege, including for specific security functions and privileged accounts.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-04
Supporting procedure: P-AC-04
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]
3.1.6 (AC.L2-3.1.6) Use non-privileged accounts or roles when accessing non-security functions.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]
3.1.7 (AC.L2-3.1.7) Prevent non-privileged users from executing privileged functions and audit the execution of such functions.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-09
Supporting procedure: P-AC-09
[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]