• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

“FedRAMP System Security Plan (SSP) High Baseline Template”

January 15, 2020 by Wade Mackey 22 Comments

Filed Under: 02 - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Percy Jacob Rwandarugali says

    January 17, 2020 at 6:15 pm

    The key point I noted in this document (FedRamp) is that; it’s a guide for cloud service providers(CSPs) when conducting risk assessments, security authorizations, and granting an ATO (Authority to operate). There are a list of controls at every level of the system and steps on how to implement them, plus the CIA triad is a constant in application of polices and the process of categorization

    Log in to Reply
    • Imran Jordan Kharabsheh says

      January 21, 2020 at 3:57 am

      Hello,
      Glancing through your main take away from the assigned reading, I found that what you stated resonates with what I also noticed while reading the FedRAMP’s System Security Plan High Baseline Template. As the primary purpose of the template is to create a snapshot of the organization’s current security framework and operations, it’s critical that the controls included in the document are adherent to CIA triad to better secure information systems.

      Log in to Reply
  2. Zeynep Sahin says

    January 17, 2020 at 9:22 pm

    The FedRAMP SSP High baseline Template provides security control requirements for high impact cloud systems. All federal agencies required to use the FedRAMP process to conduct security assessments, responsibilities and authorizations, and continuous monitoring of cloud services. The FedRAMP Program Management office (PMO) identified some requirements for FedRAMP compliance. To do so, template provides the framework for the information system environment, system responsibilities, and high baseline controls required for the system. One key point is it is important to describe the origin of controls to make clear whose responsibility it is to implement, manage and monitor the control.

    Log in to Reply
  3. Numneung Koedkietpong says

    January 18, 2020 at 12:04 am

    This FedRAMP System Security Plan (SSP) is designed template to develop security plan. It provides the example format and important data which SSP should have. In addition, For the security control sections, it is aligned with the controls in the NIST SP 800-53 and it should be evaluated the level of risks (High, Medium, Low). One key point which I took is that each control should identify the responsible role, implement status, and control origination.

    Log in to Reply
  4. Akshay Shendarkar says

    January 18, 2020 at 5:02 pm

    The System Security Plan (SSP) specifies the controls to be put in place by Cloud Service Providers (CSP) on information systems of their customers and federal agencies. The minimum-security control requirements are classified in to 17 domains. For every single domain, the controls are further classified into high/medium/low level of controls as per the sensitivity of the information asset to be safe guarded. The important point to note is that while populating the fields in this template, it becomes clear the information system or business process for which the level of control needs to be implemented. This gives a further clarification on the responsibility for implementing and monitoring these controls, which can either be the customer or CSP or both.

    Log in to Reply
    • Peiran Liu says

      January 21, 2020 at 11:11 am

      Hi Akshay,

      Yes. With this template, responsibilities will be clearer and everyone will know what to do according to the system security plan.

      Log in to Reply
    • Innocent says

      February 22, 2020 at 2:09 pm

      Good points, Akshay, Also, the information system monitoring plan must include measures and techniques to identify unauthorized use of the information systems, must deploy monitoring devices strategically within the information system to collect essential information , and at ad hoc locations to track specific types of transactions of interest to the organization.

      Log in to Reply
    • Percy Jacob Rwandarugali says

      April 1, 2020 at 4:37 pm

      Hi Akshay, i agree with you that FedRamp specifies the controls to be put in place by Cloud Service Providers (CSP) on information systems of their customers and federal agencies. Furthermore, it guides professionals on what controls deploy for Low, Medium and High security parameters.

      Log in to Reply
  5. Natalie Dorely says

    January 19, 2020 at 2:06 am

    The key takeaway I took from this document is that there are minimum security control requirements that must be met. The fact that each security control has a certain level to attain I think its good because it keeps the organization accountable for what needs to be improved to help mitigate risk. Following this protocol can also open the eyes of management to seeing other aspects of the organization that they weren’t previously aware of.

    Log in to Reply
    • Qiannan Zhen says

      January 21, 2020 at 11:27 pm

      Hi Natalie, well done. I agree with your point that this FedRAMP SSP can help administrators focus on what have not previously focused on.

      Log in to Reply
  6. Peiran Liu says

    January 19, 2020 at 8:16 pm

    The key point I want to point out is the included contingency planning for the site. It has assigned person for specific roll. It has guidelines so that the planning people won’t miss out any details like contingency planning activities should be coordinated with incident handling activities. It also gives the space for control enhancement so that the contingency plan can be improved overtime. It has training and plan testing so that staffs can handle it well when the problem occurs. System backup and recovery can also minimize the risk.

    Log in to Reply
    • Junjie Han says

      January 21, 2020 at 9:26 pm

      Hi,Peiran Liu,
      You are right, this template can be used to deal with some unexpected situations, this template is related to BCP and DRP. Employees can follow this template for appropriate actions.

      Log in to Reply
  7. Imran Jordan Kharabsheh says

    January 19, 2020 at 8:33 pm

    After I browsed through the FedRAMP’s System Security Plan High Baseline Template and read through a few of the notes left there by the publisher’s of the template, I feel like I better understand the requirements and purpose of the high baseline version of the template. While the general idea of the template itself is to create a snapshot of the current organization’s system environment, the system’s designated responsibilities, and the status of the system’s controls, I compared the Moderate Baseline Template to the High Baseline Template and found that it was tailored very differently to address the differences between the magnitude of moderate impact and high impact information systems respectively.

    Log in to Reply
    • Natalie Dorely says

      January 20, 2020 at 5:43 pm

      Hi Jordan,

      I think it’s interesting that you made that observation about the difference between the Moderate Baseline Template and High Baseline Template. I believe this was probably enforced to better measure the difference between the levels.

      Best,
      Natalie Dorely

      Log in to Reply
  8. Junjie Han says

    January 19, 2020 at 8:41 pm

    The FedRAMP System Security Plan (SSP) High Baseline Template provides a detailed form to identify and define controls.This is a template guide to security planning and can also serve as a guide to control specification requirements.Control is divided into high/medium/low levels.The organization can choose the appropriate control over the protected information assets so as to meet the organization’s risk appetite and minimum acceptable risk requirements.

    Log in to Reply
  9. Christopher James Lukens says

    January 19, 2020 at 9:45 pm

    The FedRAMP ssp high baseline template is used for documenting all the security controls of a cloud service provider to a government entity. It it used to identify where security controls are implemented within the system and who is explicitly responsible for them . all of the controls either originate from a system or a business process. The document also uses SP 800-53 and FIPS 199 for controls and and risk categorization. Overall the FedRAMP documentation of a system is an in depth look at how a system is secured and who is responsible for the controls.

    Log in to Reply
    • Akshay Shendarkar says

      January 21, 2020 at 4:27 pm

      Hello Chris,
      Good summary of the FedRAMP SSP template. I agree, the document goes in depth in how an information system can be secured. However, as this is a template, with every information that is fed in this template, it also gives a good idea about the responsibilities associated with the securing information systems.

      Log in to Reply
  10. Joseph Nguyen says

    January 19, 2020 at 10:00 pm

    The FedRAMP Template is an excellent System Security Plan (SSP) of how to implement the NIST framework SP 800-18r1. I found that the Access Control (AC) in the template uses all in the same order of the security control and enhanced that are in SP 800-53,

    Log in to Reply
  11. Sarah Puffen says

    January 19, 2020 at 11:27 pm

    The FedRAMP System Security Plan template provides the user with a set of baseline questions that describes the security controls implemented within a cloud service provider for a government agency. After skimming through the document, I thought about how it relates to our other NIST readings and how it’s essentially another form of “results documentation” for a risk assessment, but on a much larger scale.

    Log in to Reply
    • Akiyah says

      January 21, 2020 at 12:36 pm

      Hi Sarah, Yes, the “baseline questions” set forth in the FedRAMP SSP template are a great guideline to ensure compliance. Important questions are asked such as who is responsible for the systems and who should have access to certain systems, The answers to these questions can then be used for ongoing auditing purposes which can be used as “another form of results documentation”.

      Log in to Reply
  12. Qiannan Zhen says

    January 20, 2020 at 12:05 am

    The FedRAMP Template provides a template for a System Security Plan. This document uses the FIPS 199 classification of security and provides appropriate control over the implementation of the security plan for information transferred, processed or stored by the system. The FedRAMP SSP provides guidance on policy and control requirements of information system security measures.

    Log in to Reply
  13. Innocent says

    February 22, 2020 at 2:06 pm

    According to the Federal Risk and Authorization Management Program (a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services), information systems monitoring is necessary to detect attacks and identify indicators of attacks in accordance with an organization’s defined monitoring objectives. The information system monitoring plan should include measures and techniques to identify unauthorized use of the information systems, must deploy monitoring devices strategically within the information system to collect essential information , and at ad hoc locations to track specific types of transactions of interest to the organization; protects information obtained from intrusion monitoring tools from unauthorized access, modification, and deletion; heightens the level of information system monitoring activity whenever there is an indication on increased risk to organizational operations and assets etc.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in