How Can We Help?
Formal document that provides an overview of the security requirements for the information system and describes the security controls in place or planned for meeting those requirements.
SOURCE: SP 800-37; SP 800-53; SP 800-53A; SP 800-18; FIPS 200
The formal document prepared by the information system owner (or common security controls owner for inherited controls) that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements. The plan can also contain as supporting appendices or as references, other key security-related documents such as a risk assessment, privacy impact assessment, system interconnection agreements, contingency plan, security configurations, configuration management plan, and incident response plan.
SOURCE: CNSSI-4009