STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

PL-2

PlanningRev 5organization

System Security and Privacy Plans

Baselines:LowModerateHighPrivacy

Control Statement

a. Develop security and privacy plans for the system that: 1. Are consistent with the organization’s enterprise architecture; 2. Explicitly define the constituent system components; 3. Describe the operational context of the system in terms of mission and business processes; 4. Identify the individuals that fulfill system roles and responsibilities; 5. Identify the information types processed, stored, and transmitted by the system; 6. Provide the security categorization of the system, including supporting rationale; 7. Describe any specific threats to the system that are of concern to the organization; 8. Provide the results of a privacy risk assessment for systems processing personally identifiable information; 9. Describe the operational environment for the system and any dependencies on or connections to other systems or system components; 10. Provide an overview of the security and privacy requirements for the system; 11. Identify any relevant control baselines or overlays, if applicable; 12. Describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions; 13. Include risk determinations for security and privacy architecture and design decisions; 14. Include security- and privacy-related activities affecting the system that require planning and coordination with [Assignment: individuals or groups] ; and 15. Are reviewed and approved by the authorizing official or designated representative prior to plan implementation. b. Distribute copies of the plans and communicate subsequent changes to the plans to [Assignment: personnel or roles]; c. Review the plans [Assignment: frequency]; d. Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments; and e. Protect the plans from unauthorized disclosure and modification.

Supplemental Guidance

System security and privacy plans are scoped to the system and system components within the defined authorization boundary and contain an overview of the security and privacy requirements for the system and the controls selected to satisfy the requirements. The plans describe the intended application of each selected control in the context of the system with a sufficient level of detail to correctly implement the control and to subsequently assess the effectiveness of the control. The control documentation describes how system-specific and hybrid controls are implemented and the plans and expectations regarding the functionality of the system. System security and privacy plans can also be used in the design and development of systems in support of life cycle-based security and privacy engineering processes. System security and privacy plans are living documents that are updated and adapted throughout the system development life cycle (e.g., during capability determination, analysis of alternatives, requests for proposal, and design reviews). [Section 2.1](#c3397cc9-83c6-4459-adb2-836739dc1b94) describes the different types of requirements that are relevant to organizations during the system development life cycle and the relationship between requirements and controls. Organizations may develop a single, integrated security and privacy plan or maintain separate plans. Security and privacy plans relate security and privacy requirements to a set of controls and control enhancements. The plans describe how the controls and control enhancements meet the security and privacy requirements but do not provide detailed, technical descriptions of the design or implementation of the controls and control enhancements. Security and privacy plans contain sufficient information (including specifications of control parameter values for selection and assignment operations explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented. Security and privacy plans need not be single documents. The plans can be a collection of various documents, including documents that already exist. Effective security and privacy plans make extensive use of references to policies, procedures, and additional documents, including design and implementation specifications where more detailed information can be obtained. The use of references helps reduce the documentation associated with security and privacy programs and maintains the security- and privacy-related information in other established management and operational areas, including enterprise architecture, system development life cycle, systems engineering, and acquisition. Security and privacy plans need not contain detailed contingency plan or incident response plan information but can instead provide—explicitly or by reference—sufficient information to define what needs to be accomplished by those plans. Security- and privacy-related activities that may require coordination and planning with other individuals or groups within the organization include assessments, audits, inspections, hardware and software maintenance, acquisition and supply chain risk management, patch management, and contingency plan testing. Planning and coordination include emergency and nonemergency (i.e., planned or non-urgent unplanned) situations. The process defined by organizations to plan and coordinate security- and privacy-related activities can also be included in other documents, as appropriate.

Related Controls (37)

AC-2AC-6AC-14AC-17AC-20CA-2CA-3CA-7CM-9CM-13CP-2CP-4IR-4IR-8MA-4MA-5MP-4MP-5PL-7PL-8PL-10

CCI Identifiers (27)

CCI-000572Defines the frequency for reviewing the plans for the system.CCI-000574Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments.CCI-000570The organization develops a security plan for the information system that is consistent with the organization's enterprise architecture; explicitly defines the authorization boundary for the system; describes the operational context of the information system in terms of mission and business processes; provides the security category and impact level of the information system, including supporting rationale; describes the operational environment for the information system; describes relationships with, or connections to, other information systems; provides an overview of the security requirements for the system; and describes the security controls in place or planned for meeting those requirements, including a rationale for the tailoring and supplemental decisions.CCI-000571Develop security and privacy plans for the system that are reviewed and approved by the authorizing official or designated representative prior to plan implementation.CCI-000573Review the plans in accordance with organization-defined frequency.CCI-004283Develop security and privacy plans for the system that include security- and privacy-related activities affecting the system that require planning and coordination with organization-defined individuals or groups.

Linked STIG Checks (0)

No STIG checks reference this control.

PL-11
PM-1
PM-7
PM-8
PM-9
PM-10
PM-11
RA-3
RA-8
RA-9
SA-5
SA-17
SA-22
SI-12
SR-2
SR-4
CCI-003049Develop security and privacy plans for the system.
CCI-003057Develop security and privacy plans for the system that describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions.
CCI-003058The organization distributes copies of the security plan to organization-defined personnel or roles.deprecated
CCI-003059Distribute copies of the plans to organization-defined personnel or roles.
CCI-003060Defines the personnel or roles to whom copies of the plans are distributed.
CCI-003061Communicate subsequent changes to the plans to organization-defined personnel or roles.
CCI-004278Develop security and privacy plans for the system that identify the individuals that fulfill system roles and responsibilities.
CCI-004279Develop security and privacy plans for the system that identify the information types processed, stored, and transmitted by the system.
CCI-004280Develop security and privacy plans for the system that describe any specific threats to the system that are of concern to the organization.
CCI-004281Develop security and privacy plans for the system that provide the results of a privacy risk assessment for the systems processing personally identifiable information.
CCI-003062Defines the personnel or roles to whom changes to the plans are communicated.
CCI-003063Protect the plans from unauthorized disclosure.
CCI-003064Protect the plans from unauthorized modification.
CCI-004282Develop security and privacy plans for the system that include risk determinations for security and privacy architecture and design decisions.
CCI-003050Develop security and privacy plans for the system that are consistent with the organization's enterprise architecture.
CCI-003051Develop security and privacy plans for the system that explicitly defines the authorization boundary for the system.
CCI-003052Develop security and privacy plans for the system that describes the operational context of the system in terms of missions and business processes.
CCI-003053Develop security and privacy plans for the system that provide the security categorization of the system, including supporting rationale.
CCI-003054Develop security and privacy plans for the system that describe the operational environment for the system and any dependencies on or connections to, other systems or system components.
CCI-003055Develop security and privacy plans for the system that provide an overview of the security and privacy requirements for the system.
CCI-003056Develop security and privacy plans for the system that identify any relevant control baselines or overlays, if applicable.