• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

FedRAMP System Security Plan (SSP) Low Moderate High Baseline Master Template

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 1a - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:15 am

    FedRAMP (Federal Risk and Authorization Management Program) is a U.S. federal government program that provides standardized methods for evaluating, authorizing, and monitoring the security of cloud services provided by cloud service providers (CSPS). The purpose of FedRAMP is to ensure that federal government agencies have access to secure, reliable, and efficient cloud services while reducing duplicative security assessment and authorization efforts.
    In the FedRAMP process, the System Security Plan (SSP) is a key component. The SSP is a detailed document that describes how a CSP meets the security requirements of FedRAMP. SSPS typically include multiple sections covering an organization’s security policy, people, physical and environmental security, communications and network security, access control and identity management, auditing and monitoring, system and application security, and risk management.
    FedRAMP defines three baselines (Low, Moderate, and High), each corresponding to a different set of security requirements. CSPS need to select baselines based on the type of service they provide and demonstrate in the SSP how these requirements are met.
    The FedRAMP System Security Plan (SSP) low-mid-High Baseline master template is usually not a specific document, but rather a framework or guidance to help CSPS build an SSP that meets FedRAMP requirements. This master template provides the structure and format of the SSP, as well as the main points of content that each section should contain.

    Log in to Reply
  2. Yi Liu says

    March 4, 2024 at 12:09 pm

    The FedRAMP System Security Plan (SSP) High Baseline Template is designed for Cloud Service Providers (CSPs) aiming for a high baseline of security within the Federal Risk and Authorization Management Program (FedRAMP). This template guides CSPs in documenting their security controls, ensuring they meet the stringent requirements necessary for achieving a Joint Authorization Board (JAB) Provisional Authorization to Operate (P-ATO) or an Agency Authorization to Operate (ATO). This structured approach helps in aligning cloud services with federal security standards, facilitating a comprehensive and secure cloud environment for government data and applications.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in