Program Protection Plan (PPP) - AcqNotes (2024)

Intelligence & Security

Program Protection Plan (PPP)

The Program Protection Plan (PPP) is the single source document used to coordinate and integrate all protection efforts. It’s designed to deny access to Critical Program Information (CPI) to anyone not authorized, not needing to know, and prevent inadvertent disclosure of leading-edge technology to foreign interests. The PPP is a living plan to manage the risks to the U.S. capability element that contributes to the warfighter’s technical advantage, mission-critical functions and components, CTI, and system data. This acquisition document captures the systems security engineering activities, including secure cyber resilient engineering, and the results of the analyses across the life-cycle.

Definition: The Program Protection Plan (PPP) is a security-focused document to guide efforts to manage the security risks to Critical Program Information (CPI) and mission-critical functions and components for a system and program.

Program Protection Plan (PPP) Purpose

The purpose of the PPP is to coordinate and integrate all security efforts throughout the entire system’s life cycle to ensure that there is adequate protection against hostile activities against a program.

Program Protection Plan (PPP) Sub Documentation

The following are the essential five (5) documents that comprise the overall program protection. These documents are attached as appendices to the PPP. These documents include:

  • Appendix 1: Security Classification Guide (SCG)
  • Appendix 2: Counterintelligence Support Plan (CISP)
  • Appendix 3: Criticality Analysis
  • Appendix 4: Anti-Tamper (AT) Plan
  • Appendix 5: Cybersecurity Strategy

Program Protection Plan (PPP) Approval

The PPP is approved by the Program Manager (PM) after an Initial Capabilities Document (ICD) has been validated and is part of the Security Classification Guide (SCG). A draftis due for the Development RFP Release Decision and is approved at Milestone B. [1,2]

Program Protection Plan (PPP) References

Template:Program Protection Plan (PPP) v3.2 – Jul 11

Guidance: Program Protection Plan Outline and Guidance – Jul 11

Developing the Program Protection Plan (PPP)

When developing a program protection plan, developers can meet draft requirements by using all parts of the program protection plan template. Programs that have answered enough questions about the basic outline can go deeper and ask what makes their program different and what parts of the program need protection. The following guidance describes the process used to prepare a PPP when one is required: [1]

  • Any program, product, technology demonstrator, or other item developed as part of a separate acquisition process and used as a component, subsystem, or modification of another program should publish a PPP.
  • The effectiveness of the PPP is highly dependent upon the quality and currency of the information available to the program office.
    • Coordination between the Program Management Office (PMO) and supporting Counterintelligence (CI) and security activities is critical to ensure that any changes in the system CPI, threat, or environmental conditions are communicated to the proper organizations.
    • Intelligence and CI organizations supporting the program protection effort should notify the PM promptly of any information on adverse foreign interests targeting their CPI without waiting for a periodic production request.

Program Protection Plan (PPP) Content

While there is no specific format for PPPs, they normally include the following: [1]

  • System and program description
  • All program and support points of contact
  • A list of program CPI
  • Counterintelligence Analysis of CPI
  • Vulnerabilities of CPI
  • All Research and Technology Protection countermeasures (e.g., anti-tamper techniques, system security engineering) and Militarily Critical Technology List citations for applicable CPI
  • All RTP associated costs, by Fiscal Year, to include PPP development and execution
  • Foreign disclosure, direct commercial sales, co-production, import, export license or other export authorization requirements, and/or Technology Assessment/Control Plan
  • Delegation of Disclosure Authority Letter (DDL), if appropriate
  • Program Security Instruction, if appropriate

Example Program Protection Plan (PPP) Format

The following is an example format that program managers and security managers can follow when developing the PPP.

  • Section 1: Introduction
  • Section 2: Summary
  • Section 3: Critical Program Information (CPI)
  • Section 4: Horizontal Protection
  • Section 5: Threats, Vulnerabilities, and Countermeasures
  • Section 6: Other system-related plans and documents
  • Section 7: Risks
  • Section 8: Foreign Involvement
  • Section 9: Process for Management and Implementation of PPP
  • Section 10: Process for monitoring and Reporting Compromises
  • Section 11: Program Protection Costs

The PPP document includes five (5) Appendices:

  • Appendix 1: Security Classification Guide (SCG)
  • Appendix 2: Counterintelligence Support Plan (CISP)
  • Appendix 3: Criticality Analysis
  • Appendix 4: Anti-Tamper (AT) Plan
  • Appendix 5: Cybersecurity Strategy

Program Protection Plan (PPP) Regulations

  • A draft update is due for the Development RFP Release Decision and is approved at Milestone B. The PPP includes appropriate appendixes or links to required information. [2]
  • DoD Instruction (DoDI) 5000.82 requires that the PPP document be submitted five times for Milestone Decision Authority (MDA) review and approval at Milestone A, Development RFP Release Decision, Milestone B, Milestone C, and Full-Rate Production Decision Review (FRPDR).
  • The Component should submit a cybersecurity strategy as an appendix to the PPP per DoDI 5000.82.
  • For Major Capability Acquisitions (MCA) programs where the Defense Acquisition Executive (DAE) is the Milestone Decision Authority(MDA), the programs should submit PPPs to Director, S&T Program Protection not less than 45 calendar days before the relevant review for USD(R&E) approval. DoD Component PPPs will follow the DoD Component approval process.

AcqNotes Tutorial

AcqTips:

  • Detailed descriptions of program protection activities are provided in the Technology and Program Protection Guidebook.

AcqLinks and References:

  • [1] Defense Acquisition Guidebook (DAG) – Chapter 9
  • [2] DoD Instruction 5000.02 “Operation of the Defense Acquisition System”
  • Progam Protection Plan (PPP) Evaluation Criteria – Feb 2014
  • Guide: USAF Weapon System PP and SSE Guidebook v2.0
  • Template: Program Protection Plan (PPP) Template v3.2 – Jul 11

Updated: 2/84/2024

Rank: G1.6

Program Protection Plan (PPP) - AcqNotes (2024)
Top Articles
Buy Weed Online | Cannabinoids For Sale
[AMAZON] So funktioniert Amazon FRESH || Tipps & Informationen!
Funny Roblox Id Codes 2023
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Joi Databas
DPhil Research - List of thesis titles
Cooking Chutney | Ask Nigella.com
Shs Games 1V1 Lol
Evil Dead Rise Showtimes Near Massena Movieplex
Steamy Afternoon With Handsome Fernando
Which aspects are important in sales |#1 Prospection
Detroit Lions 50 50
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Grace Caroline Deepfake
978-0137606801
Justified Official Series Trailer
Patrick Bateman Notebook
London Ups Store
Committees Of Correspondence | Encyclopedia.com
Pizza Hut In Dinuba
Jinx Chapter 24: Release Date, Spoilers & Where To Read - OtakuKart
How Much You Should Be Tipping For Beauty Services - American Beauty Institute
Free Online Games on CrazyGames | Play Now!
Sizewise Stat Login
VERHUURD: Barentszstraat 12 in 'S-Gravenhage 2518 XG: Woonhuis.
Jet Ski Rental Conneaut Lake Pa
Unforeseen Drama: The Tower of Terror’s Mysterious Closure at Walt Disney World
C&T Wok Menu - Morrisville, NC Restaurant
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
Dashboard Unt
Access a Shared Resource | Computing for Arts + Sciences
Black Lion Backpack And Glider Voucher
Duke University Transcript Request
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Jambus - Definition, Beispiele, Merkmale, Wirkung
Netherforged Lavaproof Boots
404-459-1280
Ark Unlock All Skins Command
Craigslist Red Wing Mn
School Tool / School Tool Parent Portal
D3 Boards
Jail View Sumter
Nancy Pazelt Obituary
Birmingham City Schools Clever Login
Trivago Anaheim California
Thotsbook Com
Vérificateur De Billet Loto-Québec
Vci Classified Paducah
Www Pig11 Net
Ty Glass Sentenced
Latest Posts
Article information

Author: Van Hayes

Last Updated:

Views: 6022

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Van Hayes

Birthday: 1994-06-07

Address: 2004 Kling Rapid, New Destiny, MT 64658-2367

Phone: +512425013758

Job: National Farming Director

Hobby: Reading, Polo, Genealogy, amateur radio, Scouting, Stand-up comedy, Cryptography

Introduction: My name is Van Hayes, I am a thankful, friendly, smiling, calm, powerful, fine, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.