SSP should contain the controls that are determined by Federal Information Processing Standards
To protect the IT system (i.e., hardware, software, facilities, network, etc.) and the sensitive information stored in the IT system of organization, appropriate safeguards and security plans are necessary. A good IT security plan can identify, detect, solve, and prevent cybersecurity incidents such as malware, virus, phishing, system failure, and employee mistake. System Security Plan (SSP) is a useful source to overview IT systems and security controls implemented on them (SysArc, 2019). SSP document contains system owner, name of the system, security requirements, architecture, and list of control systems in the category of management, operational, and technical and how each control should be implemented and what level is responsible for it (Gantz, 2013). SSP should contain the controls that are determined by Federal Information Processing Standards (FIPS) 199 and template from the NIST SP 800-53 (UAB, n.d.).
Solution preview for the order on SSP should contain the controls that are determined by Federal Information Processing Standards
APA
189 words