200-A: FedRAMP System Security Plan (SSP) Required Documents
On Demand $499.00
Virtual Live

Course Description
This course provides CSPs with a deeper understanding of the detail and rigor required to complete the System Security Plan (SSP). The SSP is the main document of a security package in which a CSP describes all of the security controls in use on the information system and their implementation. This course will familiarize the CSP with the required documentation for initial package submission and give a detailed overview of FedRAMP’s SSP template and its supporting documents.
Program Objectives
At the conclusion of this course, you should understand:
- What documents are required for initial package submission
- Why the SSP is one of the essential documents in the Security Package
- How to properly prepare for writing an SSP and submitting a Security Package
- How the SSP has organized its relation to other documents included in the Security Package
- How to develop clear, concise, consistent, and complete information within each section of the SSP
- The appropriate level of detail to provide in the SSP
Course Features
- Lectures 16
- Quizzes 0
- Duration 40 hours
- Students 318
- Certificate No
- Assessments Yes
-
1. FedRAMP Required Documents for Package Submission
-
2. SSP Overview
- Relationships to Other Documents
- Necessary Organization and System Attributes
- Organization and Scope
- Section 1 – Identifies informationsystem name and title
- Section 2 – Identifies the system categorization in accordance with FIPS 199
- Section 3 – Identifies the system owner and contact information
- Section 4 – Identifies the authorizing official
- Section 5 – Identifies other designated contacts
- Section 6 – Identifies the assignment of security responsibility
- Section 7 – Identifies the operational status of the information system
- Section 8 – Identifies the type of information system
- Section 9 – Describes the function and purpose of the information system
- Section 10 – Describes the information system environment
- Section 11 – Identifies interconnections between other information systems
- Section 12 – Provides an in-depth description of how each security control is implemented
-
3. Tips for Writing the SSP
-
4. Instructions for Submitting a Security Package