Skip to content

System Security Plan (SSP-Lite)

Document ID: PLCY-FED-002
Version: 1.0
Effective Date: December 30, 2025
Last Review: December 30, 2025
Owner: Hop And Haul Team


CONFIDENTIAL

This document is CONFIDENTIAL and for internal use only. Do not distribute outside the organization.

1. Purpose

This document provides a condensed System Security Plan (SSP-Lite) for the Hop And Haul platform, establishing the foundation for FedRAMP Moderate authorization. It documents the system boundary, security categorization, control implementation, and continuous monitoring strategy in alignment with NIST SP 800-53 and FedRAMP requirements.


2. System Identification

2.1 System Information

AttributeValue
System NameHop And Haul
System AbbreviationFS
Version1.0
System TypeMajor Application
Service ModelSoftware as a Service (SaaS)
Deployment ModelPublic Cloud (AWS)
Authorization TypeFedRAMP Moderate

2.2 System Owner

RoleOrganization
System OwnerHop And Haul Operations
Authorizing Official[To be designated]
Information System Security Officer (ISSO)Hop And Haul Security Team

2.3 Operational Status

StatusDescription
CurrentOperational
Authorization StatusSeeking FedRAMP Moderate

3. System Description

3.1 System Purpose

Hop And Haul is a multi-tenant SaaS platform that provides fleet rideshare matching services. The system enables:

  • Secure matching between drivers and riders across fleet organizations
  • Real-time location tracking with privacy protections
  • Safety monitoring and incident response capabilities
  • Fleet management and reporting
  • Voice agent integration for hands-free operation

3.2 System Architecture

┌─────────────────────────────────────────────────────────────┐
│                    Hop And Haul Authorization Boundary         │
├─────────────────────────────────────────────────────────────┤
│  ┌─────────────┐     ┌─────────────┐     ┌─────────────┐   │
│  │   Mobile    │     │  Cloudflare │     │   Admin     │   │
│  │    Apps     │────▶│  Zero Trust │────▶│   Portal    │   │
│  └─────────────┘     └─────────────┘     └─────────────┘   │
│         │                   │                   │           │
│         ▼                   ▼                   ▼           │
│  ┌─────────────────────────────────────────────────────┐   │
│  │            Hop And Haul API (Swift Vapor)              │   │
│  │          EC2 r6g.xlarge (32GB RAM)                   │   │
│  └─────────────────────────────────────────────────────┘   │
│         │                   │                   │           │
│         ▼                   ▼                   ▼           │
│  ┌─────────────┐     ┌─────────────┐     ┌─────────────┐   │
│  │    RDS      │     │     S3      │     │ CloudWatch  │   │
│  │ PostgreSQL  │     │  Storage    │     │   Logs      │   │
│  │ (Multi-AZ)  │     │ (Encrypted) │     │             │   │
│  └─────────────┘     └─────────────┘     └─────────────┘   │
└─────────────────────────────────────────────────────────────┘

                    ┌─────────┴─────────┐
                    │ External Services │
                    │ (Outside Boundary)│
                    ├───────────────────┤
                    │ • Twilio (Voice)  │
                    │ • Samsara (ELD)   │
                    │ • Maps Provider   │
                    └───────────────────┘

3.3 System Components

ComponentDescriptionLocation
Hop And Haul APISwift Vapor application serverEC2 (us-east-1)
PostgreSQL DatabasePrimary data store with RLSRDS Multi-AZ
Object StorageEncrypted file storageS3
CDN/WAFContent delivery and protectionCloudflare
LoggingAudit and operational logsCloudWatch

3.4 System Interconnections

External SystemTypeData ExchangedDirection
AWSInfrastructureAll system operationsBidirectional
CloudflareSecurity/NetworkTraffic, authenticationBidirectional
TwilioCommunicationsVoice/SMS (masked)Bidirectional
SamsaraTelematicsVehicle location, ELDInbound
Corporate IdPAuthenticationSSO tokensInbound

4. Security Categorization

4.1 FIPS 199 Categorization

Based on FIPS 199 and NIST SP 800-60:

Security ObjectiveImpact LevelRationale
ConfidentialityModeratePII (names, locations), business data
IntegrityModerateSafety-critical matching, financial transactions
AvailabilityModerateBusiness operations dependent, safety monitoring

Overall Categorization: Moderate

4.2 Information Types

Information TypeCategoryConfidentialityIntegrityAvailability
User identityPIIModerateModerateLow
Location dataSensitiveModerateModerateModerate
Ride transactionsBusinessLowModerateModerate
Safety incidentsSensitiveModerateHighHigh
Authentication dataSecurityHighHighModerate
Audit logsSecurityModerateHighModerate

5. Authorization Boundary

5.1 Boundary Definition

The Hop And Haul authorization boundary includes:

Included:

  • Hop And Haul API application code and configuration
  • Application servers (EC2)
  • Database instances (RDS)
  • Storage buckets (S3)
  • Network configuration (VPC, security groups)
  • Logging infrastructure (CloudWatch)
  • Mobile application code (iOS, Android)

Excluded (External/Inherited):

  • AWS infrastructure (FedRAMP High inherited)
  • Cloudflare services (FedRAMP Moderate inherited)
  • Twilio communications (FedRAMP Moderate, data minimized)
  • Samsara telematics (not FedRAMP, customer managed)
  • Customer corporate networks
  • End-user devices

5.2 Data Flow

FlowSourceDestinationClassificationProtection
Mobile → APIDriver/Rider deviceHop And Haul APIModerateTLS 1.3
API → DatabaseHop And Haul APIPostgreSQLModerateTLS 1.2+
API → StorageHop And Haul APIS3ModerateTLS, SSE
API → LogsHop And Haul APICloudWatchModerateTLS
API → ExternalHop And Haul APITwilio, SamsaraLowTLS, scoped

6. Security Control Implementation Summary

6.1 Control Implementation Status

Control FamilyTotal ControlsImplementedPlannedInherited
Access Control (AC)252032
Audit & Accountability (AU)161510
Configuration Management (CM)11911
Contingency Planning (CP)131210
Identification & Authentication (IA)121011
Incident Response (IR)10910
Maintenance (MA)6402
Media Protection (MP)8602
Physical & Environmental (PE)200020
Planning (PL)9720
Personnel Security (PS)9009
Risk Assessment (RA)9810
System & Services Acquisition (SA)221462
System & Communications (SC)413272
System & Information Integrity (SI)231841

6.2 Inherited Controls

Controls inherited from AWS (FedRAMP High):

  • PE family (Physical and Environmental Protection)
  • PS family (Personnel Security) - partial
  • MA family (Maintenance) - partial

Controls inherited from Cloudflare (FedRAMP Moderate):

  • SC family (System and Communications Protection) - partial
  • AC family (Access Control) - partial

6.3 Key Control Implementations

ControlImplementation Summary
AC-2SSO integration, automated provisioning, role-based access
AC-3JWT enforcement, RLS at database, API middleware validation
AU-2Comprehensive event logging for all security events
CM-2AMI golden images, Infrastructure as Code
CP-9Automated backups, Multi-AZ deployment
IA-2MFA required for privileged access, biometric for mobile
IR-4Documented IR procedures, 24/7 on-call rotation
SC-8TLS 1.3 for all external, TLS 1.2+ for internal
SC-28AES-256-GCM encryption at rest

7. Continuous Monitoring Strategy

7.1 Monitoring Components

ComponentToolFrequency
Vulnerability scanningAWS InspectorWeekly
Configuration complianceAWS ConfigContinuous
Security event monitoringCloudWatch + SIEMReal-time
Log analysisCloudWatch InsightsDaily
Access reviewManual processQuarterly
Penetration testing3PAOAnnual

7.2 Metrics and Reporting

MetricTargetReporting
Vulnerability remediation (Critical)24 hoursWeekly
Vulnerability remediation (High)7 daysWeekly
Incident response timePer SLAMonthly
System availability99.9%Monthly
Failed login rateBaselineMonthly

7.3 POA&M Management

ActivityFrequencyOwner
POA&M reviewMonthlySecurity
Finding remediationPer timelineAssigned owner
Risk acceptance reviewQuarterlySecurity Manager
FedRAMP reportingMonthlyCompliance

8. Roles and Responsibilities

8.1 Security Roles

RoleResponsibilities
ISSOSecurity oversight, compliance, reporting
Security TeamControl implementation, monitoring, incident response
DevOpsInfrastructure security, patching, configuration
DevelopmentSecure coding, vulnerability remediation
Legal/ComplianceRegulatory compliance, contract security

8.2 User Roles

RoleAccess LevelAuthorization
DriverOwn rides, limited PIIOrg membership
RiderOwn rides, driver basicsOrg membership
Fleet AdminOrg data, user managementCustomer approval
Support StaffTicket-scoped accessEmployment + training
System AdminInfrastructureSecurity approval

9. Privacy Considerations

9.1 PII Inventory

PII TypeCollectionStorageRetention
NameRequiredEncrypted DBPer retention policy
PhoneRequiredEncrypted DBPer retention policy
LocationOperationalFuzzed/encrypted48 hours (GPS detail)
Trip historyGeneratedEncrypted DB36 months

9.2 Privacy Controls

ControlImplementation
Data minimizationCollect only necessary data
Purpose limitationUse data only for stated purposes
Location fuzzificationProtect precise location pre-match
Number maskingRelay calls, no direct numbers
Retention limitsAutomated data deletion

10. Contingency Planning

10.1 Recovery Objectives

ObjectiveTarget
Recovery Time Objective (RTO)4 hours
Recovery Point Objective (RPO)1 hour
Maximum Tolerable Downtime (MTD)24 hours

10.2 Backup Strategy

ComponentBackup TypeFrequencyRetention
DatabaseAutomated snapshotsContinuous35 days
ConfigurationGit repositoryEvery changeIndefinite
LogsS3 lifecycleContinuousPer policy
AMIsPoint-in-timeWeekly90 days

10.3 Recovery Procedures

See PLCY-DRP-001 for detailed recovery procedures.


11. Authorization Package Components

11.1 Required Documents

DocumentStatus
System Security Plan (this document)Complete
Control Implementation SummaryComplete
Risk AssessmentComplete (PLCY-RSK-001)
Contingency PlanComplete (PLCY-DRP-001)
Incident Response PlanComplete (PLCY-INC-001)
POA&MIn progress
Privacy Impact AssessmentPlanned
Rules of BehaviorComplete
Configuration Management PlanComplete

11.2 Assessment Status

ActivityStatusTimeline
Self-assessmentComplete-
Readiness assessmentPlannedAfter Phase 2
3PAO assessmentPlannedAfter readiness
Authorization decisionPlannedAfter assessment

DocumentRelationship
PLCY-FED-001Federal compliance overview
PLCY-FED-003Risk register
PLCY-FED-004Implementation roadmap
PLCY-FED-005Control mapping
PLCY-SYS-001System description
PLCY-DRP-001Disaster recovery
PLCY-INC-001Incident response

13. Document Control

VersionDateAuthorChanges
1.0December 30, 2025Hop And Haul TeamInitial release

CONFIDENTIAL - Internal Use Only - Hop And Haul Policy Documentation