• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

“FedRAMP-High-Moderate-Low-LI_SaaS-Baseline-System Security Plan (SSP) Template”

January 17, 2024 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from or observe in this assigned reading.

Filed Under: 02 - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Eyup Aslanbay says

    January 20, 2024 at 9:20 pm

    One key point from the FedRAMP’s System Security Plan Report that stands out is its detailed description of the specific security controls implemented by a Cloud Service Provider. This list helps build trust with federal agencies and makes it easier to check if the provider meets strict security standards.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 1:41 am

      In addition to trust as you have highlighted as an advantage of the system security plan for cloud service providers, I believe it also introduces a level of clarity in responsibilities and guidance for the partnership between organisations who use cloud services to provide services to and for federal agencies to ensure the protection information systems.

      Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 10:40 am

      In the context of cloud services, where security is of paramount importance, the detailed description of security controls serves as a valuable tool for both CSPs and federal agencies. It promotes a shared understanding of the security posture, contributing to a more secure and trustworthy cloud computing environment.

      Log in to Reply
  2. Ooreofeoluwa Koyejo says

    January 21, 2024 at 12:45 am

    This document caters to a detailed and organised system security control plan for cloud-based systems which aims at the protection of all assets and information using the cloud. It is important for organisations that pursue to work with federal agencies.

    It is a practically unified approach to ensure adequate technical documentation and accountability across all aspects of the protection of information systems that involve the use of a cloud service.

    Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 10:48 am

      The mention of accountability is crucial, indicating a commitment to transparency and responsibility in the implementation of security controls.

      Log in to Reply
    • Jon Stillwagon says

      January 23, 2024 at 9:58 pm

      I agree this document is needed to place the responsibilities on people when coming up with the security plan. When the security system is put into place people need to be held accountable to what fails during the actual implementation part of the plan.

      Log in to Reply
  3. Yannick Rugamba says

    January 21, 2024 at 6:09 pm

    I find it interesting that FedRAMP has levels of security requirements (Moderate, Low, LI SaaS), for cloud service providers. The System Security Plan (SSP) contains a section called the Security Controls Appendix that clearly outlines these controls. This appendix does not explain how each security control is implemented but also identifies the parties. Understanding this helps us comprehend how cybersecurity measures are customized based on the sensitivity and risk associated with levels of information.

    Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 11:03 am

      “The Security Controls Appendix not only lists the controls but also identifies the parties involved.” This adds a layer of transparency and accountability, crucial in understanding the distribution of responsibilities between different entities, including the cloud service provider and the organization.

      Log in to Reply
    • Eyup Aslanbay says

      January 23, 2024 at 9:38 pm

      Your point about FedRAMP’s security levels is really clear and important. They use different levels like Moderate, Low, and LI SaaS to match the right security to different kinds of data. The part in the SSP called the Security Controls Appendix shows these rules and who should follow them. This is a smart way to make sure that security fits the risk and type of information, which is key for keeping data safe in the cloud.

      Log in to Reply
  4. Celinemary Turner says

    January 21, 2024 at 7:01 pm

    From my reading. FedRAMP. It is a document associated with the Federal Risk and Authorization Management Program (FedRAMP), and it is about security plans for SaaS software. The classification of risk levels is high, Moderate, and Low. The template’s modular design implies a thorough framework for protecting SaaS solutions per accepted standards, highlighting the significance of customizing security measures to the unique risk profile of the system.

    Log in to Reply
    • Bo Wang says

      January 23, 2024 at 6:31 pm

      I agree on the importance of a comprehensive framework for management. For different problems, it can be based on the framework to deal with problems quickly.

      Log in to Reply
    • Edge Kroll says

      January 23, 2024 at 11:08 pm

      It is also important to point out that it specifically designates responsibilities in order to ensure accountability.

      Log in to Reply
  5. Jon Stillwagon says

    January 21, 2024 at 8:34 pm

    The FedRamp plan is a detailed plan that was accepted to be used for a company. It is very organized on how the plan has key spots where to put the information where it’s needed like the assignment of security responsibilities or the system owner. It is like a detailed piece that lets the company know who oversees what and what their responsibilities are when going into the company.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 9:47 pm

      The security plan gives attention and direction to assigning responsibilities and authority for the security control baseline to be applied.

      Log in to Reply
  6. Edge Kroll says

    January 21, 2024 at 8:44 pm

    The FedRAMP SSP template serves as a framework for documenting important information about a system, particularly in the context of cloud services with different impact levels (High, Moderate, Low, or LI-SaaS). The template is designed to capture details about a cloud system, its service offerings, components, features, and security posture.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 9:32 pm

      The specificity of this security plan template for cloud service providers makes it easier to channel the usage and application directly.

      Log in to Reply
  7. Bo Wang says

    January 21, 2024 at 10:21 pm

    What I found was the division of responsibilities, each of which is listed in a separate line in a table that describes and records responsibilities. Also list third-party relationships and indirect roles, if any. If there are too many roles, use an EXCEL spreadsheet as an appendix.

    Log in to Reply
    • Yannick Rugamba says

      January 23, 2024 at 12:14 am

      Regularly reviewing and updating these roles and responsibilities can be advantageous. It’s important to adapt them to changing security needs and personnel changes. By keeping this information up, to date we can greatly improve the security readiness and responsiveness of the organization.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in