FIPS 199 Compliance - Security Standard

Security Manual TemplateFIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.

FIPS's purpose is to support key security standards and guidelines for the implementation of and compliance with the Federal Information Security Management Act (FISMA) including:

  • Standards for categorizing information and information systems by mission impact
  • Standards for minimum security requirements for information and information systems
  • Guidance for selecting appropriate security controls for information systems
  • Guidance for assessing security controls in information systems and determining security control effectiveness
  • Guidance for the security authorization of information systems
  • Guidance for monitoring the security controls and the security authorization of information systems

FIPS 199 - Standards for Security Categorization of Federal Information and Information Systems establishes security categories for both information and information systems. The security categories are based on the potential impact on an organization should certain events occur which jeopardize the information and information systems needed by the organization to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals. Security categories are to be used in conjunction with vulnerability and threat information in assessing the risk to an organization resulting from the operation of its information systems. Security categorization standards for information and information systems provide a common framework and understanding for expressing security that, for the federal government, promotes:

  • Effective management and oversight of information security programs, including the coordination of information security efforts throughout the civilian, national security, emergency preparedness, homeland security, and law enforcement communities; and
  • Consistent reporting to the Office of Management and Budget (OMB) and Congress on the adequacy and effectiveness of information security policies, procedures, and practices. Subsequent NIST standards and guidelines will address the second and third FISMA tasks.

That along Special Publication 800-60 (Volume 1), Guide for Mapping Types of Information and Information Systems to Security Categories, assists Federal agencies in identifying information types and information systems and assigning impact levels for confidentiality, integrity, and availability. Impact levels are based on the security categorization definitions in FIPS 199. Special Publication 800-60 contains two volumes. Volume I provides guidelines for identifying impact levels by information type and suggests impact levels for administrative and support information cFIPS 199ommon to multiple agencies. Volume II includes rationale for information type and impact level recommendations and examples of recommendations for agency-specific, mission-related information.

Janco's Security Manual Template meets the compliance requirements of FIPS 199 and even provides an electronic form that can be utilized in the assessment process.

The Security Manual Template can be acquired separately or as part of the Business Continuity and Security Bundle.

Order the FIPS 199 Compliant Security Manual or the Business Continuity / Security Bundle

We have just the download you need to create a world class plan and assure you leave no stone unturned. With these Templates we walk you through the entire process, providing all the tools you need along the way. As an added benefit you can purchase an update service which keeps these templates abreast of the latest legislated and mandated requirements. All of our documents have been updated to comply with PCI-DSS, Sarbanes-Oxley, HIPAA, the ISO 27000 (formerly ISO 17799) series - 27001 & 27002, and PCI-DSS.

Both of these FIPS 199 compliant products come with a detail security audit program.

Security Manual Template - Standard Edition

  • Security PolicyBusiness and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Toolkit
  • Security Management Checklist
  • Full Detail Policies for
    • Blog and Personal Website Policy
    • Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy
    • Mobile Device Policy
    • Physical and Virtual File Server Policy
    • Sensitive Information Policy
    • Travel and Off-Site Meeting Policy
  • Job Descriptions for the Chief Compliance Officer, Chief Security Officer, Data Protection Officer, Manager Security and Workstations, Manager WFH Support, Security Architect, and Systems Administrator.
  • Work From Home (WFH) operational rules
  • HIPAA Audit Program
  • AI Security Management
  • GDPR Compliance Checklist to meet EU Requirements
  • CCPA - California Consumer Privacy Act requirements definition
  • Consumer Bill of Rights
  • Sarbanes Oxley Section 404 Checklist
  • HIPAA Audit Proram
  • Security Audit Program- fully editable -- Comes in MS EXCEL and PDF formats -- Meets GDPR, ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS, HIPAA FIPS 199, and NIS SP 800-53 requirements -- Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including: Blog Policy Compliance, BYOD Access and Use, Company Asset Employee Control Log, Email - Employee Acknowledgment, Employee Termination Checklist, FIPS 199 Assessment Electronic Form, Internet Access Request, Internet Use Approval, Internet & Electronic Communication - Employee Acknowledgment, Mobile Device Access and Use Agreement, Employee Security Acknowledgment Release, Preliminary Security Audit Checklist, Risk Assessment, Security Access Application, Security Audit Report, Security Violation Reporting, Sensitive Information Policy Compliance Agreement, Server Registration, and Threat and Vulnerability Assessment
  • eReader version of the Security Manual Template
  • BONUS - ISO 28000 Supply Chain Security Audit Program in MS EXCEL and PDF formats.

Order Security Manual Template Download Sample

DR BC SecurityDisaster Recovery Business Continuity & Security Manual Templates Standard Edition Includes

  • Disaster Recovery Business Continuity Template

  • Security Manual Template

Order DRP BCP Security Bundle  Download Sample