SC · Plan wizard

System and Communications Protection Plan

Documents how the system protects information at rest and in transit, partitions trust, defends boundaries, manages cryptographic key material, secures DNS / certificate / session integrity, and provides architectural protections (process isolation, DoS resilience, mobile-code containment). Covers the controls of the SC family in NIST SP 800-53 r5 and aligns with NIST SP 800-52 r2 (TLS), NIST SP 800-57 (Key Management), NIST SP 800-77 r1 (IPsec VPNs), NIST SP 800-95 (Web Services Security), FIPS 140-3 (Cryptographic Module Validation), and FIPS 199 / FIPS 200.

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Tooling and one-line summaries that anchor the rest of the plan.

Primary boundary defense (e.g., 'Palo Alto NGFW + AWS Network Firewall + AWS WAF', 'Cisco Firepower + ACI segmentation', 'Azure Firewall Premium + App Gateway WAF').
TLS terminator(s) + version policy (e.g., 'TLS 1.3 enforced at AWS ALB; TLS 1.2 minimum on internal mTLS via Istio').
Mechanisms protecting data at rest (e.g., 'AWS KMS-managed CMKs for EBS / S3 / RDS; LUKS for on-prem; SQL TDE for legacy DB').
Cryptographic key custody (e.g., 'AWS KMS (FIPS 140-2 L3 HSM-backed) for app data; HashiCorp Vault for secrets; internal CA for mTLS certificates').
Where FIPS 140-3 / 140-2 validation certificates are tracked (e.g., 'Cryptographic-inventory register in GRC tool; vendor CMVP certs filed at /repo/compliance/crypto/').
Brief phrase summarizing DNS integrity / DNSSEC / DoH posture. Detail goes in the Name Resolution sub-section.
Boundary Protection (SC-7) → §4.x

Network boundary architecture, ingress / egress controls, and managed interfaces.

Where the authorization boundary sits relative to the internet, partner networks, and other systems. DMZ structure, public subnets, private subnets, transit gateway, etc. Reference an architecture diagram if maintained.
How outbound traffic is restricted: allowlisted destinations, DNS-based egress filtering (e.g., AWS Route 53 Resolver DNS Firewall), proxy-enforced URL category filtering, SNI inspection.
How traffic to external organizations or networks is routed through proxies / gateways for inspection. Reference any TIC / TIC 3.0 alignment for federal systems.
Cadence at which boundary-policy / firewall-rule sets are reviewed for stale or overly permissive rules (e.g., 'Quarterly NIPR review; immediate review on any expedited add').
Transmission Protection (SC-8) → §4.x

TLS / mTLS / IPsec coverage, version policy, and inspection.

Approved ciphers and elliptic curves (e.g., 'TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256; ECDH curves P-256 / P-384'). Reference NIST SP 800-52 r2.
Whether and how outbound TLS is inspected for malware / DLP. Boundary location of break-and-inspect; PKI trust establishment on endpoints; bypass list for sensitive destinations (banking, healthcare).
Any cleartext flows that remain (e.g., legacy SCADA, isolated test net). Compensating controls and POA&M reference.
Cryptographic Key Establishment & Management (SC-12) → §4.x

Key lifecycle: generation, distribution, storage, rotation, destruction.

How key material is protected at rest. HSM-backed, sealed by KMS, escrow process. Reference NIST SP 800-57 Part 1 §6 for storage requirements.
Rotation frequency by key class. Example: 'Customer master keys: annual; data encryption keys: per-object; signing keys: 2 years (overlapping); session keys: per-session; TLS certificates: 90 days (Let's Encrypt) / 1 year (internal CA).'
Steps when a key is suspected compromised. Revocation of dependent certs, rotation of dependent secrets, notification to stakeholders. Reference IR plan for incident handling.
How keys are destroyed at end of life. Cryptographic erasure for cloud KMS, zeroize commands for HSM, NIST SP 800-88 r1 sanitization for media holding key material.
Where the cryptographic-key inventory is maintained (CMDB, GRC tool, dedicated KMS dashboard). Reference SC-13 cryptographic inventory.
FIPS 140-3 Cryptographic Protection (SC-13) → §4.x

Cryptographic module validation and inventory.

List of cryptographic modules in use with FIPS 140-3 / 140-2 certificate numbers. Example: 'OpenSSL FIPS 3.0 (CMVP #4282) for app TLS; AWS KMS HSM (CMVP #4523) for key custody; macOS CoreCrypto (CMVP #4244) for endpoint encryption.'
How FIPS certificate expiration is tracked and re-validated modules are adopted before expiry. Lead time, owner role.
Data at Rest (SC-28) → §4.x

Encryption coverage by storage class and what's not yet protected.

How DEKs and KEKs are layered. Per-object DEKs, per-tenant DEKs, per-database DEKs. KEK rotation independent of DEK rotation. Reference NIST SP 800-57 Part 1 §5 envelope encryption.
If CUI / PII / classified data is in scope: special handling (separate keys, FIPS 140-3 L3, hardware-backed). Reference SI-12 for retention.
Any locations where encryption at rest is not yet applied. Compensating controls (physical security, network isolation) and POA&M reference.
Name Resolution Security (SC-20, SC-21, SC-22) → §4.x

DNSSEC, DNS forwarding, and DNS architecture.

Who hosts the authoritative zones for system domains (e.g., 'AWS Route 53', 'Cloudflare DNS', 'enterprise BIND clusters').
Resolver(s) used by hosts (e.g., 'AWS Route 53 Resolver with DNS Firewall', 'Cisco Umbrella', 'Quad9 with DoT').
How internal and external DNS views are separated. Split-horizon DNS, internal-only zones, exfiltration-resistance via DNS firewall.
Whether DNS-over-HTTPS or DNS-over-TLS is enforced or restricted. Some orgs block external DoH to retain DNS-firewall visibility.
Session Authenticity & Network Disconnect (SC-10, SC-15, SC-23) → §4.x

Session integrity, idle disconnect, and collaborative-computing controls.

How session authenticity is preserved (signed JWTs, session-bound tokens, mTLS-enforced bindings, Token Binding). Anti-replay, session-fixation prevention.
Time after which an idle session is terminated. SC-10 ODV (e.g., '15 minutes for privileged sessions; 30 minutes for standard').
Hard cap on session duration regardless of activity (e.g., '8 hours for users; 1 hour for service-to-service tokens').
Camera / microphone / screen-share controls. Whether SC-15 ODV requires explicit indication when active. Common with VTC, Teams / Zoom integrations.
How sessions can be invalidated globally (compromise scenario): token-version increment, denylist cache, force-logout, OAuth refresh-token revocation.
Mobile Code (SC-18) → §4.x

Restrictions on JavaScript / WASM / mobile applets / browser extensions.

What mobile code is authorized to run in the system, by source / origin / trust level. Allowlist sources.
If browser-facing: CSP policy summary. Strict-source vs nonce/hash, frame-ancestors, blocking inline scripts. Reference OWASP guidance.
Architectural Protections (SC-2, SC-3, SC-4, SC-39) → §4.x

Process isolation, separation of system and user functionality.

How user and admin functionality are separated (different ports, different hosts, different identity domains, different management VLAN).
How security-relevant functions are isolated from non-security functions. Privilege rings, hypervisor / container boundaries, separate management plane.
How information in shared system resources (memory, scratch disk, cache) is prevented from leaking between users / processes. Object reuse, memory-zeroing, cache partitioning.
Denial-of-Service Protection (SC-5) → §4.x

DoS / DDoS resilience for availability.

Pointer to the DoS-response runbook in the IR plan / wiki. Activation criteria, escalation path.
Protection Scope and Coverage → §2.x

Quantitative scope numbers that anchor metrics later in the plan.

Approximate count of services that must serve TLS (informs TLS coverage rate in metrics).
Approximate count of active TLS / signing certificates managed by the system.
Total volume of data at rest under encryption (e.g., '50 TB across S3 + RDS + EFS').
Approximate count of managed interfaces at the authorization boundary (informs SC-7(3) summary).
Communications-Protection Metrics & KPIs → §6.x

Metrics tracked to demonstrate SC control effectiveness.

    Suggested:
    Boundary Coverage Verification → §6.x

    How the org continuously verifies SC boundary tooling is correctly deployed.

    How often the documented boundary diagram is reconciled with actual deployed firewalls / SGs / WAFs.
    How often firewall rule sets are reviewed for stale, overly permissive, or deprecated rules.
    How often certificate inventory is reconciled (CT logs, ACM, internal CA exports). Detects shadow / orphan certs.
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the SC control implementations are summarized (e.g., 'SSP §13.13').
    Convention for SC-related POA&M items (e.g., 'POAM-SC-' for general; 'POAM-SC7-' for boundary findings).
    How boundary / TLS / cryptographic configuration changes route through CM-3 change control. Emergency-bypass for incident response.
    How SC-7 boundary alarms (denied connections, fail-secure events, anomalous flows) feed the SI-4 monitoring pipeline.
    How cryptographic-key-management events, certificate-issuance events, and boundary-incident events flow into the audit pipeline.
    Where IA-5 authenticator material relies on SC-12 key establishment (PIV cert issuance, FIDO-key attestation, mTLS service identity).
    Where CP recovery procedures depend on SC key material (KMS keys must be available for backup decryption; HSM partition restoration during DR).
    Pointer to the CA-7 monitoring strategy document tying SC continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5