<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=Template%3ACybersecurity%2FPlanning</id>
	<title>Template:Cybersecurity/Planning - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=Template%3ACybersecurity%2FPlanning"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Template:Cybersecurity/Planning&amp;action=history"/>
	<updated>2026-04-26T04:02:39Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Template:Cybersecurity/Planning&amp;diff=37123&amp;oldid=prev</id>
		<title>Shawndouglas: Created as needed.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Template:Cybersecurity/Planning&amp;diff=37123&amp;oldid=prev"/>
		<updated>2019-12-13T23:08:32Z</updated>

		<summary type="html">&lt;p&gt;Created as needed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;====PL-1 Security planning policy and procedures====&lt;br /&gt;
This control recommends the organization develop, document, disseminate, review, and update security planning policies and procedures. It asks organizations to not only address the purpose, scope, roles, responsibilities, and enforcement of security planning action but also to address how those policies and procedures will be implemented, reviewed, and updated. &lt;br /&gt;
&lt;br /&gt;
'''Additional resources''':&lt;br /&gt;
* [https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final NIST Special Publications 800-12, Rev. 1], page 67&lt;br /&gt;
* [https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final NIST Special Publications 800-18, Rev. 1]&lt;br /&gt;
* [https://csrc.nist.gov/publications/detail/sp/800-100/final NIST Special Publications 800-100], pages 67–77&lt;br /&gt;
* [https://www.limswiki.org/index.php/LII:LIMSpec/Maintaining_Laboratory_Workflow_and_Operations#7._Document_management LIMSpec 7.1, 7.2]&lt;br /&gt;
&lt;br /&gt;
====PL-2 System security plan====&lt;br /&gt;
This control recommends the organization develop, distribute, review, update, and protect a security plan for its information system. The plan should take into consideration the organization's enterprise architecture and the organizations business and cybersecurity goals, defining the logical and physical boundaries of the system based on the architecture and goals. The operational environment, classification of the system's data, security configuration requirements, and necessary and proposed security controls should also be addressed. The plan should be reviewed and approved by designated personnel.&lt;br /&gt;
&lt;br /&gt;
'''Additional resources''':&lt;br /&gt;
* [https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final NIST Special Publications 800-18, Rev. 1]&lt;br /&gt;
* No LIMSpec comp (organizational policy rather than system specification)&lt;br /&gt;
&lt;br /&gt;
====PL-4 Rules of behavior====&lt;br /&gt;
This control recommends the organization establish a set of baseline rules of behavior that address organizational expectations and personal responsibilities of users accessing the system. Each individual should sign an acknowledgment that they have read, understand, and agree to abide by the rules of behavior. Those baseline rules should be reviewed at a designated frequency, and if updates are made, the affected individuals should be required to read, understand, and sign acknowledgement of the revised rules.&lt;br /&gt;
&lt;br /&gt;
'''Additional resources''':&lt;br /&gt;
* [https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final NIST Special Publications 800-18, Rev. 1]&lt;br /&gt;
* No LIMSpec comp (organizational policy rather than system specification)&lt;/div&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
</feed>