Skip to content

FedRAMP System Security Plan

Joey van Kuilenburg

FedRAMP System Security Plan

FedRAMP System Security Plan

This document details the System Security Plan (SSP) for the information security controls. This System Security Plan was written in accordance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-18, Revision 1, Guide for Developing Security Plans for Information Technology Systems. is a owned company headquartered in . Completion of this SSP, which describes how U.S. federal information will be safeguarded, is a requirement of the Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, Security of Federal Automated Information Resources, and Public Law 100-235, the Computer Security Act of 1987.


Connect

Kevin Jackson is a senior information technologist specializing in information technology solutions that meet critical Federal government operational requirements. Prior positions include VP & General Manager Cloud Services for NJVC, VP Federal Systems at Sirius Computer Solutions, Worldwide Sales Executive at IBM, Vice President Global IT Project Office at JP Morgan Chase, and CTO at SENTEL Corporation.

About the Author

Joey is a marketer who prefers to put in a bit of extra work to make an “ok” product or experience an amazing product or experience.

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning

sean-pollock-203658-unsplash (Large) (1)

Cloud as the Foundation for Enterprise growth – R U Ready for the Cloud?

Enterprises are adopting cloud computing The cloud hype is over, and cloud computing is adopted within the enterprise landscape. Forrester explains in a December 2018...
CTA-444

Knowledge Byte: Cloud Strategy And Workload Assessment

Cloud computing provides a new business paradigm for resources. It enables organizations to create and use IT, and business services on-demand from optimal sources to...
pcs-cover6

Knowledge Byte: Threat Model for Cloud Service Deployment

Each service and deployment model has its own risks. The best way to treat risks within cloud is to develop a threat model for the...
Scroll To Top
Tweet
Share
Share