Sharing Is Caring:

System Security Plan (SSP) for NIST 800-171 Compliance

  • The Definitive Supplement for NIST 800-171 Cybersecurity Requirements
  • Free tutorial
  • Rating: 3.5 out of 53.5 (567 ratings)
  • 10,735 students
  • 36min of on-demand video
  • Created by MARK RUSSO


What you’ll learn

  • Understand the principles of developing a System Security Plan (SSP) to meet federal contract requirements for NIST 800-171
  • Be able to formulate and assemble the artifacts needed to complete an SSP for federal contract professionals
  • Be able to support small to medium businesses to effectively submit a complete NIST-based SSP to meet contract requirements


  • Have a basic understanding of IT systems and network security principles
  • Entrepreneurs looking to provide products or services to the federal government


             There are 110 explicit security controls from NIST 800-171, revision 1, extracted from NIST’s core cybersecurity document, NIST 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, that are considered vital. This is a highly pared down set of controls for the purposes of Industry’s requirements to meet federal government cybersecurity contracting requirements.  There are over 1000 potential controls offered from NIST 800-53 revision 4; this more expansive set of controls is used extensively by DOD to protect its IT systems from its jet-fighters to its vast personnel databases.   

             This SSP is based upon the NIST and National Archives and Records Administration (NARA) templates and provides a greater clarification to the company or agency representative, business owner, and their IT staff.  This book is intended to focus business owners and their IT support staff on what is required to create and complete a System Security Plan (SSP) that sufficiently meets the NIST 800-171, revision 1, requirements.   Companies need to focus on a β€œgood faith” effort on how to best address these controls to the governmentβ€”and, it more importantly will help the business protect its own sensitive data and Intellectual Property (IP).

Read Also -->   Developing Web Applications using ReactJS (Apr 2022)

Who this course is for:

  • Small to medium business owners
  • Federal Contract Officers and Specialists
  • Cybersecurity Consultants and Professionals

Show less

Course content

1 section β€’ 5 lectures β€’ 35m total length

Introduction5 lectures β€’ 36min

  • What is the SSP?08:58
  • The Hardware & Software Lists05:56
  • Network Topology05:34
  • Security Controls06:46
  • People-Process- Technology Triad08:32
  • System Security Plan Quiz5 questions

πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡ Click Below to Enroll in Free Udemy Course πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Go to Course

πŸ‘‡πŸ‘‡ See Also πŸ‘‡πŸ‘‡

Join Us Join Us Join Us
Sharing Is Caring:

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO