1 System Security Plan (SSP)

appalachian folk anti-folk, drill and bass balkan brass band · 3:23

Listen on 93

Lyrics

[Verse 1]
Building blueprints for defense tonight
System boundaries drawn precise and tight
Description flows from infrastructure core
Control implementations behind each door
OSCAL formats make the data sing
Machine-readable, automated everything

[Chorus]
Structure, boundary, controls align
SSP foundation by design
Specific statements, measurable proof
Assessors need the documented truth
Living document through each phase
System Security Plan displays

[Verse 2]
Leveraged controls from platforms below
Hybrid splits the responsibility flow
System-specific ones you implement
Each statement shows exactly what you meant
Reference actual configurations here
No vague assertions, make the method clear

[Chorus]
Structure, boundary, controls align
SSP foundation by design
Specific statements, measurable proof
Assessors need the documented truth
Living document through each phase
System Security Plan displays

[Bridge]
Lifecycle changes, update the plan
Development cycles, understand
OSCAL schemas automate the way
Machine consumption saves the day
Boundary diagrams reveal the scope
Architecture gives assessors hope

[Verse 3]
Control families organized and clean
Implementation details paint the scene
Authorization evidence compiled
Documentation properly styled
From concept through production's door
SSP evolves and adapts for more

[Final Chorus]
Structure, boundary, controls align
SSP foundation by design
Specific statements, measurable proof
Assessors find the documented truth
Living document through each phase
System Security Plan displays

[Outro]
OSCAL transforms the ancient art
Machine and human, both can parse apart
Defense infrastructure needs this frame
System Security Plan's the name

← 6 Container Supply Chain Security | 2 Authorization Boundary Definition →