Transcript
A (0:02)
All right, folks, it is the middle of June of 2025, and here we go. You asked for it, and we're here to deliver. We're going to talk about the thing that people love to hate the most. System security plans. Since 2016, defense contractors have been required to, and I quote, develop, document and peer review, periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems. How hard could it be? Turns out really, really freaking super duper hard. Did you know that out of the hundreds and hundreds of items that you could potentially be asked about during an assessment of NIST SP 800171 or only one thing is listed in every single requirement as a potential assessment item? If you don't have a system security plan, you can't have an assessment score in the Supplier Performance Risk System. And if the Department of Justice finds out about that little problem, you could easily be fined millions of dollars under the False Claims act, whether you're a big company or a small company. And this is not just a NIST thing. System security plans are core to the Federal Information System Controls Audit manual used by GAO. SSPs predate the entire 853 catalog that's been around for 20 years. SSPs are older than I am. They go all the way back to the Computer security Act of 1987. And yet when NIST SP 800171 was first published in 2015, system security plans weren't even a requirement. How the hell is that even possible? We've had literal decades of system security plans being a core fundamental pillar to all of this stuff. And there's basically no examples of what they're even supposed to look like available to you today. But there's good news, everybody. NIST is Revising Special Publication 818 that outlines system security plans, and they want your comments by July 30, 2025. NIST Spa 118 was originally published in 1998, and it hasn't been updated since 2006. I graduated high school in 2006. The only way that we're ever going to get good examples of what an SSP looks and get rid of this monkey off of everybody's back that nobody likes to deal with, but everybody has to deal with is if everybody asks NIST for examples. And so today, to get everybody on the same page, we are going to do a crash course on SSPs. Their theory, their logic, their limits, and what's actually required of you. And that's what we're going to talk about today.
B (3:14)
Well, what an intro that was. But as somebody that is older than SSPs and cough, cough. Dust comes out as I cough. As somebody that's older than SSPs, I share your same sentiments as far as how appalling it is that SSPs are so overlooked. It's not just in this specific thing. Like I told you in many conversations, one of the first things that I ever learned was that the SSP is a the most vital document to any any security program. And the reason why is because it is. The foundation is like the architecture design of a house. It tells you what's inside the house, what is supposed to be there, the dimensions, etc and how that executes. The only difference between that architectural design and the SSP is the SSP is ever evolving because security is ever evolving. In my career, again, I have been told the SSP is super important. And then I come into work, into the division and I realized that not everybody else places the SSP on the same pedestal as me. Maybe it's just because it's for a lack of understanding of what a true SSP is. Let's do our job here and try to get people to ask for the examples that they're going to need so that we can get better SSPs in the environment.
