PS · Plan wizard

Personnel Security Plan

Documents how the system's personnel-security risks are managed across the employee / contractor lifecycle: position risk designation, pre-access screening, termination, transfer, access agreements, external-personnel governance, sanctions, and position descriptions. Covers the controls of the PS family in NIST SP 800-53 r5 and aligns with 5 CFR Part 731 (Suitability), 5 CFR Part 1400 (Designation of National Security Positions), Executive Order 12968 (Access to Classified Information), Federal Investigative Standards (FIS), HSPD-12, and OPM background-investigation policies.

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Roles and providers that anchor the rest of the plan.

Role that owns the personnel-security workflow on the HR side (e.g., 'Personnel Security Branch within HR', 'Agency PSO under the CSO').
Provider conducting background investigations (e.g., 'OPM / NBIB / DCSA for federal positions', 'HireRight + private references for contractor-only positions').
Role / methodology used to designate position risk (e.g., 'OPM Position Designation Tool with HR-CSO joint review', 'Internal position-sensitivity matrix based on data access level').
Role responsible for applying sanctions for security violations (e.g., 'HR with CSO concurrence', 'CO / contracting officer for contractor staff').
Where signed access agreements (NDAs, Rules of Behavior, AUPs) are stored. HRMS, contract file, secure document repository.
Position Risk Designation (PS-2) → §4.x

How positions are categorized for screening level.

How often position-risk designations are reviewed (typical: 'Annual + on position-description change'). PS-2 ODV.
Role accountable for periodic review of position-risk designations.
Crosswalk from each risk level to the corresponding background-investigation type (e.g., 'Low Risk → Tier 1; Moderate Risk Public Trust → Tier 2; High Risk Public Trust → Tier 4').
Personnel Screening (PS-3) → §4.x

Pre-access investigation and reauthorization.

When screenings must be redone (e.g., 'Tier 5: every 5 years; Tier 4: every 5 years; Tier 2: every 10 years; or upon Continuous Vetting flag event'). Reference Federal Investigative Standards.
When and how interim access is granted while full investigation is in progress. Common criteria: favorable fingerprint result + signed SF-86 + supervisor approval.
Personnel Termination (PS-4) → §4.x

Off-boarding workflow that cuts access and recovers assets.

Time from termination effective date until logical and physical access is revoked. PS-4 ODV. Common: 'Same business day for involuntary; end-of-business-day for voluntary'.
Special handling for terminations for cause (immediate access cut prior to notification, escort during exit, asset-recovery procedure).
How long termination-checklist evidence is retained (typically per NARA records-retention schedule for personnel records).
Personnel Transfer (PS-5) → §4.x

Reassignment workflow that updates access entitlements.

Time from transfer effective date until access entitlements are reviewed and adjusted. Common: 'Within 7 days of effective date'.
Whether and how a transferring employee retains access to the old role during transition. Time limit, justification, removal trigger.
Whether the new role requires a higher-tier screening; trigger for upgrade investigation.
Access Agreements (PS-6) → §4.x

Documents personnel sign before access is granted.

How often agreements are reviewed / re-signed. PS-6 ODV. Common: 'Annual', 'On significant change to terms'.
Where signed agreements are stored, retention period, who has read access. Reference NARA records schedule.
How current-agreement status is tracked (HRMS field, separate compliance dashboard, expiration alerts).
External Personnel (PS-7) → §4.x

Contractor staff, vendor staff, partner-organization staff.

What background screening external personnel must complete (typically same standard as employees in equivalent risk positions). Reference contract clauses (DFARS 252.204-7012 for DoD).
Time within which external organization must notify the agency of personnel changes (terminations, transfers, new staff requiring access).
How often external organizations attest to current screening / agreement status (e.g., 'Quarterly').
Personnel Sanctions (PS-8) → §4.x

Disciplinary process for security-policy violations.

Who decides what sanction applies. Mix of HR, security, supervisor, contracting officer for contractors.
How affected parties are notified, due-process steps, appeal mechanism. Reference org HR policy.
Cadence at which sanctions are summarized to senior leadership (anonymous trends or named per HR policy).
Position Descriptions (PS-9) → §4.x

Security responsibilities written into position descriptions.

How often position descriptions are reviewed for currency (typical: 'Annually'). PS-9 ODV.
Where the standard PD template (with security clauses) lives.
Personnel Scope and Coverage → §2.x

Quantitative scope numbers that anchor metrics later in the plan.

Approximate count of all personnel (employees + contractors) in scope.
Approximate % of total personnel that are contractor / vendor staff.
Count of positions designated High Risk Public Trust or higher.
Count of external organizations (contractors, partners, vendors with system access).
Personnel-Security Metrics & KPIs → §6.x

Metrics tracked to demonstrate PS control effectiveness.

    Suggested:
    Personnel-to-Access Reconciliation → §6.x

    Continuous verification that personnel records match access entitlements.

    How often the personnel system (HRMS) is reconciled against logical (AC-2) and physical (PE-2) access lists. Common: 'Weekly automated; monthly manual review'.
    Time from identification of a reconciliation gap to closure (e.g., 'Same business day for terminated personnel still holding access'). Common audit finding when not actively monitored.
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the PS control implementations are summarized (e.g., 'SSP §13.10').
    Convention for PS-related POA&M items (e.g., 'POAM-PS-' for general).
    How PS-3 screening status feeds PE-2 physical-access authorization. Trigger that updates PE-2 list when screening lapses or terminates.
    How PS-3 / PS-4 / PS-5 outcomes drive AC-2 logical-account lifecycle. Termination automation, transfer review trigger.
    How PS-6 access agreements pair with AT-2 awareness training. Co-administered or separate?
    How PS-7 external-personnel governance ties to SA-9 external-system-services management. Personnel-change notification flowing through both pathways.
    How security incidents involving personnel feed PS-8 sanctions workflow. Insider-threat reporting.
    Pointer to the CA-7 monitoring strategy document tying PS continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5