Example NCP SSP en

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

SYSTEM SECURITY PLAN (SSP)

ACME Consulting, LLC

SCOPING:
 Name of System: [name of contractor’s internal, unclassified information system the SSP addresses]
 DUNS #: [contractor’s DUNS #]
 Contract #: [contractor’s contract # or other type of agreement description]
 CAGE Code #: [contractors CAGE code #]

DISTRIBUTION: [list who this SSP is distributed to (e.g., contracting official, prime contractors, etc.)]

REVISION DATE: [list the date of the last revision]

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Table of Contents
Prepared By & Record of Changes 4
Prepared By 4
Revision History 4
Ownership & Cybersecurity Overview 5
General Description / Purpose 5
Contracts Containing CUI 5
System Identification - CUI Overview 5
Key Stakeholders 5
Documentation Repository 6
Data Protection Considerations 6
Additional Compliance Requirements 6
System Environment 8
Operating Model 8
Interconnectivity Overview 9
Identification & Authentication Overview 9
System Components & Network Boundaries 9
Roles & Privileges 12
Supply Chain Overview 13
Ongoing Maintenance & Support Plan 13
System Development Life Cycle (SDLC) 14
Operational Phase 14
Milestones 14
Identified Deficiencies & Remediation Plan 15
Security Requirements 15
Identified Control / Practice Deficiencies 15
System Security Plan (SSP) Appendices 16
Appendix A: Data Protection Considerations 16
Appendix B: Hardware and Software Inventory (HSI) 21
Appendix C: Interconnectivity Documentation 22
Appendix D: External System Connections 23
Appendix E: Additional Security Considerations 24
Appendix F: Cybersecurity Roles & Responsibilities 25
Glossary: Acronyms & Definitions 34
Acronyms 34
Definitions 34
Annex 1 – Security Requirements (NIST SP 800-171 CUI & NFO Controls / CMMC Practices) 35
NIST SP 800-171 Appendix D: 3.1 Access Control 35
NIST SP 800-171 Appendix D: 3.2 Awareness & Training 47
NIST SP 800-171 Appendix D: 3.3 Audit & Accountability 49
NIST SP 800-171 Appendix D: 3.4 Configuration Management 54
NIST SP 800-171 Appendix D: 3.5 Identification & Authentication 59
NIST SP 800-171 Appendix D: 3.6 Incident Response 65
NIST SP 800-171 Appendix D: 3.7 Maintenance 67
NIST SP 800-171 Appendix D: 3.8 Media Protection 71
NIST SP 800-171 Appendix D: 3.9 Personnel Security 76
NIST SP 800-171 Appendix D: 3.10 Physical Protection 78
NIST SP 800-171 Appendix D: 3.11 Risk Assessment 82
NIST SP 800-171 Appendix D: 3.12 Security Assessment 84
NIST SP 800-171 Appendix D: 3.13 System & Communications Protection 87
NIST SP 800-171 Appendix D: 3.14 System & Information Integrity 96
NIST SP 800-171 Appendix E: Non-Federal Organization (NFO) Controls 100

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 2 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
INSTRUCTION ON FILLING OUT THE SSP TEMPLATE
It is important to understand that there is no officially-sanctioned format for a System Security Plan (SSP) to meet NIST SP 800-171
compliance requirements. This template is based on SSP requirements that are used for other US government compliance
requirements for SSPs, but it is tailored to document the entire Controlled Unclassified Information (CUI) environment for an
organization.

A key concept to keep in mind with the SSP is that it should be complete enough for a reasonable person to pick up, read through
and understand the following information:
 What CUI is in regards to the company’s operations.
 Where CUI is stored, transmitted or processed.
 What controls are in place to protect CUI as it is stored, transmitted and processed.
 Any deficiencies that exist in protecting CUI, if applicable.
 Remediation plans address known deficiencies, if applicable.

Steps to fill out the SSP include:


 Step 1 – Read through the SSP template to get an understanding of the content required to fill out the template.

 Step 2 – Start filling out the information you have available, using the examples as guidance, where applicable.

 Step 3 – Work with stakeholders to fill in missing information.

 Step 4 – Work through Annex 1 to provide evidence of how each of the applicable CUI and Non-Federal Organization (NFO)
controls are being addressed.

 Step 5 – For any CUI or NFO control that is not addressed, add an entry in the accompanying Plan of Action & Milestones
(POA&M) template

Documentation Notes:
 Text in BLACK are standard template text that are expected to be included in the SSP and should not be deleted unless
necessary.
 Text in RED are helpful instructions that need to be deleted as sections are completed.
 Text in BLUE are examples that need to be deleted as sections are completed.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 3 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Prepared By & Record of Changes

Prepared By
[Name]
[Email Address]
[Phone #]
[Department]

Revision History

Version Date Pages Affected Description


1.0 TBD All Initial publish of SSP.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 4 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Ownership & Cybersecurity Overview

The objective of the System Security Plan (SSP) document is to have a simple, easy-to-reference document that covers pertinent
information about the Controlled Unclassified Information (CUI) environment. This is a “living document” that is meant to be
updated as conditions change.

The goal of this document is simple - anyone not familiar with the CUI environment should be able to read it and gain a fundamental
understanding of the systems involved, the risks, and the security controls required to maintain an acceptable level of security.

Essentially, this document provides a centralized repository for knowledge that is specific to the CUI environment and its applicable
security controls. The SSP reflects input from those responsible for the systems that make up the CUI environment, including
information owners, system operators, and other stakeholders.

General Description / Purpose


[provide a high-level description of the purpose of the system/application/service that is in scope]

Contracts Containing CUI


[list the applicable contracts that contain CUI protection requirements]

System Identification - CUI Overview


[provide a descriptive narrative of how CUI is defined by the applicable contract(s). Include a description of the function/purpose of
the internal unclassified information system(s)/network(s) that is(are) addressed in the plan.]

Example:
Contract XXXXXX defines CUI as schematic diagrams that are pertinent to the XYZ project.

Key Stakeholders
CUI protection is a combined effort from the following stakeholders:
 Stakeholder 1, Position
 Stakeholder 2, Position
 Stakeholder 3, Position

Example:
It is sometimes worthwhile to include an organization chart, since this can assist with problem escalations.

CIO

Networking
Team 1 Team 2
Technology

Technology
Infrastructure

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 5 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Documentation Repository
Information security-related project and system documentation can be found at:

[add URL for network share, etc.]

Data Protection Considerations


The assets within the CUI environment are assessed, based on data sensitivity and mission criticality, in order to ensure the
appropriate level of protection is applied.

Appendix A (Data Protection Considerations) provides the methodology for how data is classified in terms of data sensitivity and
criticality to the CUI environment.

Additional Compliance Requirements


In addition to CUI protection requirements from the Defense Federal Acquisition Regulation Supplement (DFARS 252.204-7012), the
following compliance requirements are also applicable, due to overlapping requirements for cybersecurity and privacy controls:

Statutory Requirements
[fill-in applicable statutory requirements]

Example statutory requirements include:


 Cable Communications Policy Act (CCPA)
 Children’s Internet Protection Act (CIPA)
 Children’s Online Privacy Protection Act (COPPA)
 Computer Fraud and Abuse Act (CFAA)
 Consumer Credit Reporting Reform Act (CCRRA)
 Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
 Electronic Communications Privacy Act (ECPA)
 Electronic Freedom of Information Act (E-FOIA)
 Electronic Funds Transfer Act (EFTA)
 Fair & Accurate Credit Transactions Act (FACTA)
 Fair Credit Reporting Act (FCRA)
 Family Education Rights and Privacy Act (FERPA)
 Federal Information Security Management Act (FISMA)
 Federal Trade Commission Act (FTCA)
 Gramm Leach Bliley Act (GLBA)
 Health Insurance Portability and Accountability Act (HIPAA)
 Privacy Act
 Right to Financial Privacy Act (RFPA)
 Sarbanes Oxley Act (SOX)
 Telecommunications Act
 Telephone Consumer Protection Act (TCPA)
 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
(USA PATRIOT Act)
 Video Privacy Protection Act (VPPA)
 US State - Massachusetts 201 CMR 17.00
 US State - Oregon Identity Theft Protection Act (ORS 646A)
 International - United Kingdom Data Protection Act (UK DPA)

Regulatory Requirements
[fill-in applicable regulatory requirements]

Example regulatory requirements include:


 Federal Acquisition Regulation (FAR 52.204-21)
 European Union General Data Protection Regulation (EU GDPR)
 Financial Industry Regulatory Authority (FINRA)
 National Industrial Security Program Operating Manual (NISPOM)

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 6 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
 Department of Defense Information Assurance Risk Management Framework (DIARMF) (DoDI 8510.01)
 Federal Risk and Authorization Management Program (FedRAMP)
 New York Department of Financial Services (NY DFS) 23 NYCCRR 500
 North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP)

Contractual Requirements
[fill-in applicable contractual requirements]

Example contractual requirements include:


 Payment Card Industry Data Security Standard (PCI DSS)
 Generally Accepted Privacy Principles (GAPP)
 American Institute of CPAs Service Organization Control (AICPA SOC2)
 Center for Internet Security Critical Security Controls (CIS CSC)
 Cloud Security Alliance Cloud Controls Matrix (CSA CCM)

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 7 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
System Environment

This section contains a detailed topology narrative and graphic shall that clearly depicts the system environment, including system
boundaries, system interconnections, and key components.

Instruction: This does not require depicting every device, but would include an instance of operating systems in use, virtual and
physical servers (e.g., file, print, web, database, application), as well as any networked workstations, firewalls, routers, switches,
copiers, printers, lab equipment, etc. If components of other systems that interconnect/interface with this system need to be shown
on the diagram, denote the system boundaries by referencing the security plans or names and owners of the other system(s) in the
diagram. Include or reference (e.g., to an inventory database or spreadsheet) a complete hardware and software inventory,
including make/model/version and maintenance responsibility.

Delete this and all other instructions from your final version of this document.

Operating Model
Operating Environment Where CUI Exists (check all that apply)
☐ Public Cloud Cloud services and infrastructure supporting multiple organizations and clients
Cloud services and infrastructure dedicated to a specific organization and no other
☐ Private Cloud
clients
☐ Data Center Company-owned & operated datacenter.
Explain: (e.g., cloud services and infrastructure that provides private cloud for secured
☐ Hybrid
applications and data where required and public cloud for other applications and data)
☐ Dispersed Endpoints CUI can be found on workstations and other endpoints.
☐ Other Explain:

High-Level Overview of Where CUI Is Stored, Transmitted or Processed (check all that apply)
☐ End User Workstations End user workstations (e.g., desktops & laptops)
☐ Mobile Devices Mobile devices (e.g., tablets or smartphones)
☐ Industrial Control System (ICS) Devices that control manufacturing processes
☐ Internal application/service Internal application (e.g., ERM, SAP, ticket system, change control, etc.)
☐ Software as a Service (SaaS) Web-based applications (e.g., Google Apps, Salesforce, GoToMeeting, WebEx)
☐ Platform as a Service (PaaS) Web-based major applications (e.g., Azure Cloud Services)
☐ Infrastructure as a Service (IaaS) Cloud environments (e.g., Azure, AWS, Rackspace)
☐ Other Explain:

Example:

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 8 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Interconnectivity Overview
[provide a descriptive narrative how systems within the CUI environment communicate – is it internal only? Does it communicate
outside of the company’s network?]

Appendix B (Hardware and Software Inventory), provides a breakdown of assets that comprise the CUI environment in both the
production and development instances.

Appendix C (Interconnectivity Documentation), provides a detailed description of ports, protocols and services, in use within the
CUI environment.

Identification & Authentication Overview


[provide a descriptive narrative of how the system handles identification & authentication]
[describe how many users are involved. Also describe how many administrators are involved]

Example:
Vendor accounts will be created in the ACME instance and pushed to the XXXXX instance. Only one account per vendor will be allowed.
The vendor account will be inactivated when the vendor submits their documentation.

The two instances of XXXXX will use different methods for user identification and authentication, since the XXXXX-hosted instance
will be externally accessible to vendors.

ACME Instance
 User Names: AD integration
 Passwords: AD integration
 Account Reviews: Tied into AD
 Account Deactivation: Tied into AD

XXXXX Instance
 User Names:
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: Local XXXXX account (hosted instance only)
 Passwords:
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: TBD
 Account Reviews:
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: TBD
 Account Deactivation: Tied into AD
o ACME Users: Ping Federate (AD integration)
o Non-ACME Users: TBD

System Components & Network Boundaries


[provide a descriptive narrative of what makes up the CUI operating environment, including defining the assets involved and the
system boundaries]

Example:
XYZ is designed with two distinct instances, running in two different environments:
 Internal XXXXX instance that is housed in ACME’s datacenter (Datacenter 1); and
 Hosted XXXXX instance in Microsoft’s Azure private cloud.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 9 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
High-Level Network Diagram

[add network diagram here - if you do not have a network diagram, you can work with https://www.network-diagrams.com to
obtain a quality network diagram and data flow diagram for your CUI environment (see below for an example)]

Instruction: Useful tools to create a high-level network diagram include:


- Microsoft Visio (network diagram templates) or
- Department of Homeland Security’s free tool, the Cyber Security Evaluation Tool (CSET) - https://ics-cert.us-
cert.gov/sites/default/files/FactSheets/ICS-CERT_FactSheet_CSET_S508C.pdf

Provide a diagram that portrays the system boundaries and all applicable connections and components, including the means for
monitoring and controlling communications at the external boundary and at key internal boundaries within the system.

Address all components and managed interfaces of the information system authorized for operation (e.g., routers, firewalls).

Formal names of components as they are known by the project team in functional specifications, configuration guides, other
documents and live configurations shall be named on the diagram and described. Components identified in the Boundary diagram
should be consistent with the Network diagram and the inventory(ies). Provide a key to symbols used. Ensure consistency between
the boundary and network diagrams and respective descriptions
If necessary, include multiple network diagrams.

Delete this and all other instructions from your final version of this document.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 10 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
System Development Life Cycle (SDLC)

Operational Phase
The CUI environment is currently:
Operational Status
☐ Operational CUI is being used by systems in a production environment.
☐ Under Development CUI is being used by systems in a developmental / testing environment.
☐ Major Modification CUI systems are undergoing a major change, development, or transition.
☐ Other Explain:

The dates planned and dates reached for each phase of the System Development Lifecycle (SDLC) and Control Validation Testing
(CVT) milestones:

Traditional SDLC Phase Date Planned Date Reached


Initiate ? ?
Develop / Design / Acquire ? ?
Implement ? ?
Operate & Maintain ? ?
Dispose ? ?

Milestones
[Enter a narrative about the planned milestones planned for the life of the systems that make up the CUI environment]

Example:
XYZ is currently in the operate phase. Updates and changes to XYZ is expected throughout the fiscal year. There are currently no
envisioned alterations to XYZ that would severely affect its operational status during updates and changes to the system
environment. XYZ will be undergoing major modification during the course of FY2018, including network engineering, security
engineering, and systems engineering

INSTRUCTIONS: All milestones about operational status should be stated. If the system is about to go through a major revision, all
milestones along the way should be listed as well.

Delete this and all other instructions from your final version of this document.

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 14 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Annex 1 – Security Requirements (NIST SP 800-171 CUI & NFO Controls / CMMC Practices)

The SSP consists of the applicable NIST SP 800-53 rev4 controls, as mapped in NIST SP 800-171 Appendix D (CUI controls) and
Appendix E (NFO controls).

NIST SP 800-171 Appendix D: 3.1 Access Control


These controls are associated with access control:

3.1.1 (AC.L1-3.1.1) Limit system access to authorized users, processes acting on behalf of authorized users, or devices (including
other systems).
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-02
Supporting procedure: P-AC-02

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.2 (AC.L1-3.1.2) Limit system access to the types of transactions and functions that authorized users are permitted to execute.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 35 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Summary of NIST SP 800-171 & CMMC Controls Implementation
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-01
Supporting procedure: P-AC-01

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.3 (AC.L2-3.1.3) Control the flow of CUI in accordance with approved authorizations.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-03
Supporting procedure: P-AC-03

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.4 (AC.L2-3.1.4) Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 36 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Summary of NIST SP 800-171 & CMMC Controls Implementation
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Personnel Security (PS) policy
Supporting standard: PS-03
Supporting procedure: P-PS-03

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.5 (AC.L2-3.1.5) Employ the principle of least privilege, including for specific security functions and privileged accounts.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-04
Supporting procedure: P-AC-04

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.6 (AC.L2-3.1.6) Use non-privileged accounts or roles when accessing non-security functions.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 37 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)
Summary of NIST SP 800-171 & CMMC Controls Implementation
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-07
Supporting procedure: P-AC-07

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.7 (AC.L2-3.1.7) Prevent non-privileged users from executing privileged functions and audit the execution of such functions.
Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)
☐ Partially Implemented (Identified in POA&M)
☐ Planned (Identified in POA&M)
☐ Alternative Implementation (Compensating Controls)
☐ Not applicable
Process Owner: [name of the individual or team accountable for the procedure being performed]
Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]
Occurrence: [how often the procedure need is performed]
Location of Additional Documentation:
[location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]
Technology in Use:
[if applicable, the name of the application/system/service used to perform the procedure]
Description of Control Implementation:
Supporting policy: Access Control (AC) policy
Supporting standard: AC-09
Supporting procedure: P-AC-09

[briefly describe the solution and how it is implemented or simply reference the policy/standard/procedure where more detailed
information can address this requirement]

3.1.8 (AC.L2-3.1.8) Limit unsuccessful logon attempts.


Summary of NIST SP 800-171 & CMMC Controls Implementation
Implementation Status (check all that apply):
☐ Implemented (control execution internal to ACME)
☐ Implemented (control execution external to ACME via contract and/or shared responsibility)

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES


Page 38 of 132
WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

You might also like