Sample Cybersecurity Profile (System Security Plan)
 
 Overview
 
 Every organization must create a cybersecurity profile (system security  plan (SSP)) for all of its major and minor information systems. The  cybersecurity profile documents the current and planned controls for the  system and addresses security concerns that may affect the system's  operating environment. The cybersecurity profile includes security  categorizations and security controls, and is included in the  certification and accreditation package. For this project, you will  create a sample cybersecurity profile describing the security posture  for HHS (Dept of Health & Human Service).
 
 
 Learning Objectives
 
 After completing this project, students will be able to
 
 
 
 Select and incorporate appropriate      management, technical, and  operational security controls into a system security      plan.
 Integrate and evaluate management, technical, and operational controls in the context of an information security program.
 Develop a sample System Security Plan      for an information system.
 
 
 Deliverable
 
 Your sample cybersecurity profile should be at least five full pages,  double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a  cover page (name, course number, date, title of paper) and a reference  page. The cover page and reference page are not included in the  five-page minimum. Papers not meeting the five full-page minimum will  lose points. You must have at least three sources, correctly formatted  per APA guidelines. 
 
 
 
 Detailed Description of Learning Activity
 
 Read NIST Special Publication 800-53 Rev 4 Guide for Assessing the  Security Controls in Federal Information Systems and Organizations,  Building Effective Security Assessment Plans.
 Review the sample System Security Plan template provided by your instructor.
 Select one management, one technical, and one operational control that  apply to your selected organization (i.e., Risk Assessment-RA).
 Describe each control. Include why these controls are required.
 For each management, technical, and operational control, select two family controls (Vulnerability Scanning-RA-5).
 Describe each family control, state the implementation status as it  relates to your selected organization's security program, and describe  how your selected organization implements the control.
 Write your sample cybersecurity profile. At a minimum, the profile should include
 an Introduction that includes the purpose of your paper and introduces  security profiles as they relate to your selected organization
 an Analysis section that includes Items 3-6 above
 a Conclusion that summarizes what you wrote
 Use spell and grammar check before submitting. It is also a good idea to  have someone else read your paper. You should also review the grading  rubric below to ensure that you have all the graded components.