Rate impact for each CIA objective. FIPS 199 is the highest of the three.
Highest of the three above: —
Guidance for Cloud Networking, IAM, Infrastructure Protection, Data Protection, Detection, and Recovery.
List all sources of confidential data within the system. Include inputs, outputs, and web-based systems that accept user input.
Describe privileged system users and access (system, service, administrative accounts).
List system inputs/outputs (system, data exchanged, classification, method, direction, destination, frequency, contact).
List connections and check whether each is G2G, G2B, or G2C. Mark trusted if applicable.
Enter the completion date (If applicable) of plan:
Enter the date the system security plan was approved and indicate if the approval documentation is attached or on file:
Enter the date the Information System Recovery Plan was approved and indicate if the approval documentation is attached or on file: