SI · Plan wizard

System and Information Integrity Plan

Documents how the system identifies, reports, and remediates flaws; protects against malicious code; monitors system events; and maintains the integrity of software, firmware, and information. Covers the controls of the SI family in NIST SP 800-53 r5 and aligns with NIST SP 800-40 r4 (Patch Management), NIST SP 800-83 r1 (Malware), NIST SP 800-94 (IDS/IPS), and NIST SP 800-115 (Technical Guide to Information Security Testing).

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Tooling and one-line summaries that anchor the rest of the plan.

Primary scanner (e.g., 'Tenable.sc', 'Qualys VMDR', 'Rapid7 InsightVM', 'AWS Inspector + Trivy').
AV / EDR platform (e.g., 'CrowdStrike Falcon', 'Microsoft Defender for Endpoint', 'SentinelOne', 'Carbon Black').
IDS / IPS / NDR / EDR feeding monitoring (often the same tool as malware protection plus a network-side counterpart).
Brief phrase summarizing where alerts come from. Detail goes in the dedicated sub-section.
How software / firmware / file integrity is verified (e.g., 'Tripwire FIM + signed Git tags + SBOM verification at build').
Flaw Remediation (SI-2) → §4.x

Vulnerability scanning, patch evaluation, and remediation SLAs.

Map CVSS / vendor severity to patch SLA. Example: 'Critical (CVSS 9.0+ or KEV catalog): 15 days; High (7.0–8.9): 30 days; Medium (4.0–6.9): 90 days; Low: best-effort.' Federal systems often follow BOD 22-01 timelines for KEVs.
How CISA's Known Exploited Vulnerabilities catalog drives expedited remediation. BOD 22-01 timelines if applicable. Reference for federal agencies.
From CVE published → tested → CCB approved → deployed → verified. Reference §4 of the CM plan for the change workflow.
When a patch can't be applied within SLA: deviation request, compensating control, time-bound POA&M item.
Malicious Code Protection (SI-3) → §4.x

AV / EDR coverage, signature management, and response on detection.

How users report suspected malware (e.g., 'phish report button in email client; ServiceNow Security Incident form').
System Monitoring (SI-4) → §4.x

IDS / IPS / EDR / NDR / WAF and what they monitor for.

Where SI-4 alerts land (typically SIEM + IR ticketing — see §4 of AU and IR plans).
How often the org attests that all in-scope assets have monitoring agents installed and reporting.
Security Alerts and Advisories (SI-5) → §4.x

Sources of advisories and how they're triaged.

How advisories flow into the workflow (email distribution → triage → ticket; automated TIP / SOAR ingestion).
Time from advisory publication to triage decision (apply / not applicable / monitor / accept risk).
Who internal to the org receives advisories that affect this system (System Owner, Engineering, ISSO, CCB chair).
Integrity Verification (SI-6, SI-7) → §4.x

Software / firmware / file integrity, and security-function verification.

Tool monitoring the filesystem for unauthorized changes (e.g., 'Tripwire', 'OSSEC / Wazuh', 'AIDE', 'Defender for Endpoint integrity rules').
Which files / directories are under FIM (system binaries, config dirs, web content, application code, etc.).
Code signing for installed software, signed package repositories, secure boot for firmware. Reference SBOM if applicable.
How often security functions (e.g., crypto, access control) are verified to be operating correctly.
Input Validation (SI-10) → §4.x

How input from users, services, and external sources is validated.

Whitelist vs blacklist, schema validation, parameterized queries, OWASP ASVS alignment level.
How often validation rules are reviewed against new attack patterns (e.g., 'After each major release', 'Quarterly with security').
Error Handling (SI-11) → §4.x

What's exposed in error messages vs what's logged for debugging.

What users see on errors. Best practice: generic messages with a correlation ID; sensitive details in logs only.
What's captured in audit / application logs (stack trace, query, parameters). Reference AU plan privacy_redaction for what's masked.
How often error logs are reviewed for new failure patterns / security signals.
Information Management & Retention (SI-12) → §4.x

Lifecycle of information stored, processed, or transmitted by the system.

NARA records schedule, organizational records-retention policy, or contractual reference (e.g., 'NARA GRS 4.2 for security records; per data-sharing-agreement Sec 8 for partner data').
How records are destroyed at end of retention. Reference NIST SP 800-88 r1 sanitization requirements + MP-6.
How accuracy / completeness / currency of stored information is maintained, especially for PII (per SI-18).
Integrity Scope and Coverage → §2.x

What's in scope for monitoring, scanning, and integrity protection.

Approximate count of hosts / containers / VMs requiring monitoring + AV/EDR coverage.
Public-facing surface (web servers, APIs, etc.) — typically more frequently scanned.
Order of magnitude (e.g., '5 TB application data; ~50M user records').
Integrity Metrics & KPIs → §6.x

Metrics tracked to demonstrate SI control effectiveness.

    Suggested:
    Monitoring Coverage Verification → §6.x

    How the org continuously verifies SI tooling is actually deployed everywhere it should be.

    How assets without required SI agents are detected (CMDB ↔ EDR roster reconciliation; nightly diff job).
    Time from detection to gap closed (e.g., 'Within 24h for production'; '7 days otherwise').
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the SI control implementations are summarized (e.g., 'SSP §13.10').
    Convention for SI-related POA&M items (e.g., 'POAM-SI-' for general; 'POAM-SI2-' for vuln-specific).
    How SI-4 monitoring events flow into the audit pipeline (SIEM index, log sources, retention).
    How SI-3 / SI-4 / SI-7 detections become incidents in the IR plan workflow.
    How SI-2 flaw remediation consumes RA-5 vulnerability scans. Tooling, frequency, ticket queue.
    How patches feed through the CM-3 change-control workflow. Emergency-patch pathway.
    Pointer to the CA-7 monitoring strategy document tying SI continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5