|  APRIL 1999  
 
 
         
          | Guide For Developing 
              Security Plans For Information Technology Systems |   Today’s rapidly changing technical 
      environment requires federal agencies to adopt a minimum set of management 
      controls to protect vital information technology (IT) resources. These management 
      controls are directed at individual IT users in order to reflect the distributed 
      nature of today’s technology. Technical and operational controls support 
      management controls. To be effective, all of these controls must interrelate.  The Information Technology Laboratory 
      (ITL) at the National Institute of Standards and Technology recently published 
      Special Publication 800-18, Guide 
      for Developing Security Plans for Information Technology Systems. 
      Developed by Marianne Swanson and a working group of the Federal Computer 
      Security Program Managers’ Forum, the publication addresses the development 
      of security plans that document the management, technical, and operational 
      controls for federal automated information systems. The publication provides 
      guidance for individuals responsible for IT security at the system level 
      and at the organization level. It is written specifically for individuals 
      with little or no computer security expertise. The document can also be 
      used as an auditing tool by auditors, managers, and IT security officers. 
      The concepts presented are generic and can be applied to organizations in 
      private and public sectors. This ITL Bulletin summarizes the purpose, 
      responsibilities, format, and development of an effective security plan 
      (the guide provides detailed information). BackgroundThe completion of system security plans is a requirement of the Office of 
      Management and Budget (OMB) Circular A-130, "Management of Federal Information 
      Resources," Appendix III, "Security of Federal Automated Information Resources," 
      updated in 1996, and of Public Law 100-235, "Computer Security Act of 1987." 
      OMB Circular A-130, Appendix III, does not distinguish between sensitive 
      and non-sensitive systems. Rather, consistent with the Computer Security 
      Act of 1987, the Circular recognizes that federal automated information 
      systems have varied sensitivity and criticality. All federal systems have 
      some level of sensitivity and require protection as part of good management 
      practice. OMB Bulletin 90-08, dated July 9, 1990, which provided initial 
      security planning guidance, is superseded by the issuance of Special Publication 
      800-18. The generic term "system" is used in the document to mean either 
      a major application or a general support system.
 Major Application or General 
      Support System PlansAll applications and systems must be covered by system security plans if 
      they are categorized as a "major application" or "general support system". 
      Specific security plans for other applications are not required because 
      the security controls for those applications or systems would be provided 
      by the general support systems in which they operate. For example, a department-wide 
      Financial Management System would be a major application requiring its own 
      security plan. A local program designed to track expenditures against an 
      office budget might not be considered a major application and would be covered 
      by a general support system security plan for an office automation system 
      or a local area network (LAN). Standard commercial off-the-shelf software 
      (such as word processing software, electronic mail software, utility software, 
      or other general- purpose software) would not typically be considered a 
      major application and would be covered by the plans for the general support 
      system on which they are installed.
 Purposes of System Security 
      Plans 
       Provide an overview of the 
        security requirements of the system and describe the controls in place 
        or planned for meeting those requirements; and 
 Delineate responsibilities 
        and expected behavior of all individuals who access the system. Security Plan ResponsibilitiesThe system owner is responsible for ensuring that the security plan is prepared 
      and for implementing the plan and monitoring its effectiveness. Security 
      plans should reflect input from various individuals with responsibilities 
      concerning the system, including functional "end users," information owners, 
      the system administrator, and the system security manager.
 Agencies may require contractor 
      compliance with the guide as a contract requirement. A security plan in 
      the format specified in the document or in another agreed-upon format is 
      suggested in those cases where vendors are operating a system under contract 
      to the federal government. In those instances where a contractor or other 
      entity (e.g., state or local government) operates a system that supports 
      a federal function, a security plan is required. OMB Circular A-130 requires a 
      summary of the security plan to be incorporated into the strategic IRM plan 
      required by the Paperwork Reduction Act (44 U.S.C. Chapter 35). Agencies should develop policy 
      on the security planning process. Security plans are living documents that 
      require periodic reviews, modifications, and milestone or completion dates 
      for planned controls. Procedures should be in place outlining who reviews 
      the plans and follows up on planned controls. In addition, procedures are 
      needed describing how security plans will be used in the authorization for 
      processing process.  Recommended FormatWhile the format in Special Publication 800-18 is recommended, it is recognized 
      that some agencies have developed plans using other formats that meet A-130 
      requirements. The document is intended as guidance only and should not be 
      construed as the only format allowed. A standardized approach, however, 
      not only makes the development of the plan easier by providing examples, 
      but also provides a baseline to review plans. The level of detail included 
      within the plan should be consistent with the criticality and value of the 
      system to the organization’s mission (i.e., a more detailed plan is required 
      for systems critical to the organization’s mission). The security plan should 
      fully identify and describe the controls currently in place or planned for 
      the system and should include a list of rules of behavior (see Appendices 
      A and B of the document).
 System AnalysisOnce completed, a security plan will contain technical information about 
      the system, its security requirements, and the controls implemented to provide 
      protection against its risks and vulnerabilities. Before the plan can be 
      developed, a determination must be made as to which type of plan is required 
      for a system. An analysis of the system determines the boundaries of the 
      system and the type of system.
 System Boundaries	
      Defining what constitutes a "system" for the purposes of the guideline requires 
      an analysis of system boundaries and organizational responsibilities. Constructing 
      logical boundaries around a set of processes, communications, storage, and 
      related resources, as defined by the guideline, identifies a system. The 
      elements within these boundaries constitute a single system requiring a 
      security plan. Each element of the system must: 
       Be under the same 
        direct management control;
 Have the same 
        function or mission objective;
 Have essentially the same 
        operating characteristics and security needs; and
 Reside in the same 
        general operating environment. All components of a system need 
      not be physically connected (e.g., a group of stand-alone personal computers 
      (PCs) in an office; a group of PCs placed in employees’ homes under defined 
      telecommuting program rules; a group of portable PCs provided to employees 
      who require mobile computing capability for their jobs; and a system with 
      multiple identical configurations that are installed in locations with the 
      same environmental and physical safeguards).  Multiple Similar Systems 
      An organization may have systems that differ only in the responsible organization 
      or the physical environment in which they are located (e.g., air traffic 
      control systems). In such instances, it is appropriate and recommended to 
      use plans that are identical except for those areas of difference. This 
      approach provides consistent levels of protection for similar systems.  System CategoryThe next step is to categorize each system as either a "major application" 
      or as a "general support system." All applications should be covered by 
      a security plan. The applications will either be covered individually if 
      they have been designated as a major application or within the security 
      plan of a general support system. A system may be designated as a major 
      application even though it is also supported by a system that has been designated 
      as a general support system. For example, a LAN may be designated a general 
      support system and have a security plan. The organization’s accounting system 
      may be designated as a major application even though the computing and communication 
      resources of the LAN support it. In this example, the major application 
      requires additional security requirements due to the sensitivity of the 
      information the application processes. When a security plan is required 
      for a major application that is supported by a general support system, coordination 
      of both plans is required.
 Major ApplicationsAll federal applications have value and require some level of protection. 
      Certain applications, because of the information they contain, process, 
      or transmit or because of their criticality to the organization’s missions, 
      require special management oversight. These applications are major applications.
 Agencies are expected to exercise 
      management judgment in determining which of their applications is a major 
      application and to ensure that the security requirements of non-major applications 
      are discussed as part of the security plan for the applicable general support 
      systems. Major applications are systems 
      that perform clearly defined functions for which there are readily identifiable 
      security considerations and needs (e.g., an electronic funds transfer system). 
      A major application might comprise many individual programs and hardware, 
      software, and telecommunications components. These components can be a single 
      software application or a combination of hardware/software focused on supporting 
      a specific mission-related function. A major application may also consist 
      of multiple individual applications if all are related to a single mission 
      function (e.g., payroll or personnel). If a system is defined as a major 
      application and the application is run on another organization's general 
      support system: 
       Notify the system owner that 
        the application is critical or contains sensitive information and 
        provide specific security requirements; 
 Provide a copy of the major 
        application’s security plan to the operator of the general support system;
 Request a copy of the system 
        security plan of the general support system and ensure it provides adequate 
        protection for the application and information; and
 Include a reference to the 
        general support system security plan, including the unique name/identifier 
        information.  General Support System 
      A general support system is interconnected information resources under the 
      same direct management control that shares common functionality. A general 
      support system normally includes hardware, software, information, data, 
      applications, communications, facilities, and people and provides support 
      for a variety of users and/or applications. A general support system, for 
      example, can be a:
 
       LAN including smart terminals 
        that supports a branch office;
 Backbone (e.g., agency-wide); 
        
 Communications network; 
 Departmental data processing 
        center including its operating system and utilities; 
 Tactical radio network; or 
        
 Shared information processing 
        service organization.  A major application can run 
      on a general support system. The general support system plan should reference 
      the major application plan(s).  Plan Development for All 
      SystemsAll security plans, at a minimum, should be marked, handled, and controlled 
      to the level of sensitivity determined by organizational policy. In addition, 
      all security plans should be dated for ease of tracking modifications and 
      approvals. Dating each page of a security plan may be appropriate if updates 
      are to be made through change pages. Both types of plans must contain general 
      descriptive information regarding who is responsible for the system, the 
      purpose of the system, and the sensitivity level of the system.
  System IdentificationSystem Name/Title
 The plan begins with listing the name and title of the system/application. 
      Each system/application should be assigned a unique name/identifier. Assigning 
      a unique identifier to each system helps to ensure that appropriate security 
      requirements are met based on the unique requirements for the system, and 
      that allocated resources are appropriately applied. Further, the use of 
      unique system identifiers is integral to the IT system investment models 
      and analyses established under the requirements of the Information Technology 
      Management Reform Act of 1996 (also known as the Clinger-Cohen Act). The 
      identifier could be a combination of alphabetic and numeric characters and 
      can be used in combination with the system/application name. The unique 
      name/identifier should remain the same throughout the life of the system 
      to allow the organization to track completion of security requirements over 
      time.
 Responsible Organization List the federal organizational sub-component responsible for the system. 
      If a state or local government or contractor performs the function, identify 
      both the federal and other organization and describe the relationship. Be 
      specific about the organization and do not abbreviate. Include physical 
      locations and addresses.
 Information Contact(s)List the name, title, organization, and telephone number of one or more 
      persons designated to be the point(s) of contact for this system. One of 
      the contacts given should be identified as the system owner. The designated 
      persons should have sufficient knowledge of the system to be able to provide 
      additional information or points of contact, as needed.
 Assignment of Security Responsibility 
      An individual must be assigned responsibility in writing to ensure that 
      the application or general support system has adequate security. To be effective, 
      this individual must be knowledgeable of the management, operational, and 
      technical controls used to protect the system. Include the name, title, 
      and telephone number of the individual who has been assigned responsibility 
      for the security of the system.
 System Operational Status 
      Indicate one or more of the following for the system’s operational status. 
      If more than one status is selected, list which part of the system is covered 
      under each status.
 
       Operational 
        the system is operating.
Under development  
        the system is being designed, developed, or implemented.
Undergoing a major modification 
        the system is undergoing a major conversion or transition.  
     If the system is under development 
      or undergoing a major modification, provide information about the methods 
      used to assure that up-front security requirements are included. Include 
      specific controls in the appropriate sections of the plan depending on where 
      the system is in the security life cycle.  General Description/PurposePresent a brief description (one-three paragraphs) of the function and purpose 
      of the system (e.g., economic indicator, network support for an organization, 
      business census data analysis, crop-reporting support).
  If the system is a general support 
      system, list all applications supported by the general support system. Specify 
      if the application is or is not a major application and include unique name/identifiers, 
      where applicable. Describe each application's function and the information 
      processed. Include a list of user organizations, whether they are internal 
      or external to the system owner’s organization, and a general description 
      of the type of information and processing provided. Request information 
      from the application owners (and a copy of the security plans for major 
      applications) to ensure their requirements are met.   System Environment 
      Provide a brief (one-three paragraphs) general description of the technical 
      system. Include any environmental or technical factors that raise special 
      security concerns, such as:
 
       The system is connected to 
        the Internet; 
It is located in a harsh or 
        overseas environment; 
 Software is rapidly implemented; 
        
 The software resides on an 
        open network used by the general public or with overseas access;
The application is processed 
        at a facility outside of the organization's control; or 
The general support mainframe 
        has dial-up lines. Describe the primary computing 
      platform(s) used (e.g., mainframe, desk top, LAN or Wide Area Network (WAN). 
      Include a general description of the principal system components, including 
      hardware, software, and communications resources. Discuss the type of communications 
      included (e.g., dedicated circuits, dial circuits, public data/voice networks, 
      Internet). Describe controls used to protect communication lines in the 
      appropriate sections of the security plan.  Include any security software 
      protecting the system and information. Describe in general terms the type 
      of security protection provided (e.g., access control to the computing platform 
      and stored files at the operating system level or access to data records 
      within an application). Include only controls that have been implemented 
      or are planned, rather than listing the controls that are available in the 
      software. Controls that are available, but not implemented, provide no protection. 
     System Interconnection/Information 
      Sharing  System interconnection is the 
      direct connection of systems for the purpose of sharing information resources. 
      System interconnection, if not appropriately protected, may result in a 
      compromise of all connected systems and the data they store, process, or 
      transmit. It is important that system operators, information owners, and 
      management obtain as much information as possible about the vulnerabilities 
      associated with system interconnection and information sharing and the increased 
      controls required to mitigate those vulnerabilities. The security plan for 
      the systems often serves as a mechanism to effect this security information 
      exchange and allows management to make informed decisions regarding risk 
      reduction and acceptance.  OMB Circular A-130 requires 
      that written management authorization (often in the form of a Memorandum 
      of Understanding or Agreement) be obtained prior to connecting with other 
      systems and/or sharing sensitive data/information. The written authorization 
      shall detail the rules of behavior and controls that must be maintained 
      by the interconnecting systems. A description of the rules for interconnecting 
      systems and for protecting shared data must be included with this security 
      plan.  In this section, provide the 
        following information concerning the authorization for the connection 
        to other systems or the sharing of information: 
            
         List of interconnected 
          systems (including Internet);
 Unique system identifiers, 
          if appropriate;
 Name of system(s);
 Organization owning the 
          other system(s);
 Type of interconnection 
          (TCP/IP, Dial, SNA, etc.);
 Short discussion of major 
          concerns or considerations in determining interconnection;
 Name and title of authorizing 
          management official(s);
 Date of authorization;
 System of Record, if applicable 
          (Privacy Act data);
 Sensitivity level of each 
          system;
 Interaction among systems; 
          and
 Security concerns and Rules 
          of Behavior (see Appendices A and B of the guide) of the other systems 
          that need to be considered in the protection of this system. Sensitivity of Information 
        Handled This section provides a description of the types of information handled 
        by the system and an analysis of the criticality of the information. The 
        sensitivity and criticality of the information stored within, processed 
        by, or transmitted by a system provides a basis for the value of the system 
        and is one of the major factors in risk management. The description will 
        provide information to a variety of users, including:
 
            
         Analysts/programmers who 
          will use it to help design appropriate security controls;
 Internal and external auditors 
          evaluating system security measures; and
 Managers making decisions 
          about the reasonableness of security countermeasures. The nature of the information 
        sensitivity and criticality must be described in this section. The description 
        must contain information on applicable laws, regulations, and policies 
        affecting the system and a general description of sensitivity. The remainder of the guidance 
        document details the management, operational, and technical controls, 
        discussed for both major applications and general support systems. Appendices 
        include Rules of Behavior, templates for security plans, a glossary, references, 
        and an index. For more informationThe planning guideline is 
        available for download in Microsoft Word ‘97 (.doc) and Adobe Acrobat 
        (.pdf) formats. Paper copies can be ordered from the Government Printing 
        Office at (202) 512-1800; the order number is SN003-003-03590-4 and the 
        price is $14.00. Paper copies are also available from the National Technical 
        Information Service (NTIS) at (703) 605-6000; order number is PB99-105116.
 To Top
 |