DRAFT Publication 4812 State of Security (SoS) Package
|
|
|
- Jody Ferguson
- 10 years ago
- Views:
Transcription
1 DRAFT Publication 4812 State of Security (SoS) Package Contractor Security Controls Handling and Protecting Information or Information Systems ***This Package Pertains to IT Assets Owned and Managed at Contractor Sites*** January 2014
2 The Need for Contractor Security Controls Inside this SoS Package The Need for Contractor Security Controls SoS Questionnaire Instructions SoS Questionnaire The E-Government Act of 2002 (Public Law ) Title III, Federal Information Security Management Act (FISMA) of 2002 requires each agency to provide security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source. FISMA requires federal agencies to develop and implement policies for information security oversight of contractors and other users with access to federal information and information systems. Because of requirements distinct to Internal Revenue Service (IRS) mission objectives, as well as specific laws or rulings, such as the Gramm-Leach Bliley (GLB) Act, the Federal Trade Commission (FTC) Financial Privacy Rule and Safeguards Rule, and the Sarbanes-Oxley Act, IRS contractors, their affiliates, subcontractors, and service providers are subject to additional requirements for protecting information and information systems, when appropriate or applicable. Contractor Statements of Security Assurance Contractor Statements of Physical Security Assurance System Security Plan 13 Publication 4812 defines basic security controls, requirements and standards that apply to contractors, contractor employees, subcontractors, and subcontractor employees supporting the primary contract, based on the security controls framework under National Institute of Standards and Technology (NIST) Special Publication (SP) (Revision 3), Recommended Security Controls for Federal Information Systems and Organizations, as amended, where those contractor employees have access to, develop, operate, or maintain IRS information or information systems. While NIST SP (Revision 3), as amended, is a general guide, the intent of Publication 4812 is to provide IRS security requirements in the IRS contracting environment. For all contracts subject to this publication that are 12 months or more in duration (inclusive of the base period and/or any exercised option periods), and the value of which is greater than the Simplified Acquisition Threshold (currently $150,000 as defined in FAR Part 2) (inclusive of the value of the base period and all options), the contractor shall develop and submit a State of Security (SoS) package each period of performance of the contract (base and ex-
3 The Need for Contractor Security Controls (continued) The SoS package shall be furnished to the Contracting Officer s Representative (COR) (or the Contracting Officer (CO) if no COR is appointed) no later than 60 calendar days after the effective date of the contract in the base period (typically, the award date, unless specified otherwise), and on or before the annual anniversary of the effective date of the contract in each exercised option period. Note: If the base period is less than 60 calendar days in duration, the initial submission is still due within 60 days of the effective date of the contract (although it technically falls in the first option period), and the next submission is still due on or before the annual anniversary of the effective date of the contract (although it too technically falls in the first option period). Any information submitted electronically for the SoS package shall be encrypted and sent to [email protected]
4 SoS Questionnaire Instructions Administrative Data: Provides the data required to identify the contractor, the IRS Contracting Officer, the IRS Contracting Officer s Representative, as well as the contract for which the SoS is being completed. The data in this section is self explanatory with the following notes: 1. Place of Performance if Different from Location of Facility: Identify the specific location where the work on the contract is being performed if it is different than the contractor address/location of facility. 2. Contract Purpose: Provide a brief statement that describes what the contract entails. For example: The purpose of the contract is to provide support in processing taxpayer revenues. This includes all income and expenses. Subcontractor and/or Service Provider Information: Provide the name and address of any subcontractor that will support the IRS contract. Security Environment Indicators: This section is used to provide a high level determination of the type of information being processed in support of the contract, the security control level that contract falls under, if the data is available on a public facing website, and if there has been a contract review in the past 3 three years for this or another IRS contract/order. 1. Returns or Returns Information: Identify if the contract includes the processing or any taxpayer returns or return information. If yes, determine the volume. Volume is determined by the number of individual returns or return information processed during a specified period of time. For example, 1,000,000 taxpayer returns annually. The contract will usually provide the answer to this question. 2. Personally Identifiable Information (PII): If the answer was yes to tax payer returns, then this number will generally be the same. In the case of return information, the number could be different. For example, the tax return data only contains metrics, but not any personally identifiable information such as name, address, taxpayer identification number. The type of return information and number will determine the volume of PII being processed. The contract will usually provide the answer to this question. 3. Law Enforcement Sensitive (LES) Data: LES data is defined as any data collected, processed, and/or stored in the support of law enforcement activities. For ex-
5 SoS Questionnaire Instructions (continued) 4. Security Control Level: The term Security Control Level is used in Appendix C of Publication 4812 to describe categories/levels such as Core (C), Core Simplified Acquisition Threshold (CSAT), Core Networked Information Technology (CNET) and Core Software Application Development (CSOFT). For additional information, please refer to Publication 4812 Appendix C. Publically Facing Website: Publically facing websites are defined as websites that are available to the general public over the Internet. If such a website is used to support the contract, answer yes and identify the URL (website name/address). Previous Contract Review: Identify if there has been an IRS contract review in the last 3 years for this or another IRS contract/order. If yes, then complete the remaining questions. When and where it was completed and the contract number it was completed for. Determine if there were any vulnerabilities/security weaknesses identified and if any POA&Ms exist. In general POA&Ms identify the weakness and the strategy/plan to mitigate identified vulnerabilities/weaknesses. IT Environment: Provides information on how IRS data is processed in support of the contract. Respond yes or not to each question. 1. Self explanatory. 2. Determine if the IT system being used to support the IRS contract is wholly owned and managed by internal sources. If yes, than the answer is no. If a third-party source is used, for example: the servers are located in a third-party datacenter, then the answer is yes. The answer would also be yes if you use any third-party vendor to provide maintenance or other support for servers that support the IRS contractor. 3. Answer yes if IRS data is either physically or logically separated from any other data being processed on the IR system. 4. Determine if a plan is in place and documented to destroy or sanitize all IRS sensitive information /data from computers, devices, and electronic and information technology upon contract termination. 5. Self Explanatory.
6 SoS Questionnaire Instructions (continued) Backup/Contingency 1. Answer yes if backups that contain IRS data are physically or logically segregated from backups containing any other data. 2. Is your backup media encrypted using FIPS standards? 3. Answer yes, if the alternate processing or storage facility is located outside of the United States. Please identify any offshore location that is not a U.S. territory. 4. Please enter the address and location of your backup media/devices. Additional Comments: Use this section to respond to any open ended questions where additional space is needed.
7 SoS Questionnaire The SoS Questionnaire consists of a series of closed ended questions. Note: Preference for POC is the Contractor Security Representative. A. ADMINISTRATIVE INFORMATION 1. Contractor Name: 2. Contractor Address/Location of Facility: 3. Place of Performance if Different From Location of Facility: 4. Point of Contact (POC) Name: 5. POC Telephone Number: 6. POC Address: 7. Business Website/URL: 8. IRS CO and COR: 9. Contract/Order Number: 10. Contract/Order Short Title: 11. Contract Purpose (Please provide two sentences describing the purpose): 12. Period of Performance (base/base plus all options): 13. Dollar Value (base/base plus all options): 14. Business Size (# of staff supporting the contract): 15. Date Questionnaire Completed: Note: Preference for POC is the Contractor Security Representative. B. SUBCONTRACTOR and/or SERVICE PROVIDER INFORMATION 1. Subcontractor 1 Name: 2. Address: 1. Subcontractor 2 Name: 2. Address: 3. Subcontractor 3 Name:
8 SoS Questionnaire (continued) C. SECURITY ENVIRONMENT INDICATORS YES NO N/A Does the site/place of performance handle or process any of the following types of information? 1. Returns or return information? If yes, indicate volume? a) The number of taxpayer records housed at the facility? 2. PII? If yes, indicate volume? a) Law Enforcement Sensitive Information? If Yes, please provide explanation. 3. What security control level does your contract fall within (i.e., C, CSAT, CNET, and CSOFT)? 4. Are you currently operating or maintaining a public facing website for IRS/ Treasury? a) If yes, web site name, e.g. HTTP address? 5. Has IRS Contractor Security Assessments (CSA) conducted a security assessment under the contract order (or another IRS contract/order) within the last 3 years of the date questionnaire completed? a) If yes, when/where/contract number? 6. If Yes, is there a Plan of Action & Milestones (POA&M)? a) Date of Last POA&M Update? Provide a POA&M.
9 SoS Questionnaire (continued) C. SECURITY ENVIRONMENT INDICATORS YES NO N/A 7. Has an independent third-party Security assessment been conducted? If yes provide information e.g. who, what, where and when. 8. Is there a plan/procedure in place to ensure all information is returned to the IRS and to ensure all information is sanitized and/or destroyed when being retained on IT computer assets? Note: As needed, add rows for subcontractors with access to IRS information. D. IT ENVIRONMENT YES NO N/A 1. Are you using workstations/desktop computers to store or process IRS sensitive information? 2. Are you using file servers to store or process IRS sensitive information? 3. Is Microsoft Active Directory, or similar tool, being used to manage server/ workstation environments? 4. Does you partition or segregate IRS information/data from that of other customers/clients? 5. Do you have automated tools to enable hard drives to be degaussed and/or wiped, when data is no longer required, hardware is broken, or when the contract ends? E. BACKUP/CONTINGENCY YES NO N/A 1. Are all backups that contain SBU data segregated from all other backups? 2. Is all backup media encrypted? 3. Are backups maintained in a facility other than the production facility? 4. Is there alternate processing or storage facility used for SBU data located outside of the United States? a) Alternate Backup Address:
10 SoS Questionnaire (continued) F. ADDITIONAL COMMENTS
11 Assurance Contractor Security Reviews are conducted by IRS and cannot be a self-assessment performed by the contractor. Contractor Statements of Security Assurance (CSSA) to be completed by contractors, as described hereinafter; however, do provide the means for the contractor to make a preliminary assertion to the IRS as to its perceived level of conformity to security requirements. Such assessments/assertions can provide contractors further insight into their own operating environments, and serve as one of the tools used to determine if and when a Contractor Security Review will be performed by the IRS on any given contract, in any given annual review cycle. The IRS shall employ CSSAs as part of an integrated security management approach to proactively mitigate security risks. IRS shall use a staged report card or traffic light information system in its assessment of contractor reporting to augment compliance reviews (i.e., Contractor Security Reviews). CSSAs are not required for contracts subject to Publication 4812 that are less than 180 days in duration. CSSAs are required for all contracts subject to Publication 4812 that are between 180 days and 12 months in duration and in which there are no options to extend the term of the contract. Contractors in this group are required to submit a CSSA to the COR during the period of performance according to the following schedule: For contracting actions with a start date on or after July 1 st, not later than December 31 st of that same year, or 180 days after the award date; whichever date is later. For contracting actions with a start date after January 2 nd, not later than June 30 th of that same year, or 180 days after the award date, whichever date is later. The CSSA, available at the following site -Contractor- Security-Controls, is in the format of an electronic questionnaire that includes a dropdown menu that allows the user to select the version of the CSSA associated with the security control level applicable to the immediate contract.
12 Assurance The Contractor Statement of Physical Security Assurance (CSPSA) is the IRS security management approach to the Physical Security in proactively mitigating security risks. The CSPSA is a companion form to the CSSA and is required as part of the SoS Package. (see requirement guidance for the CSSA) The CSPSA, available at the following site -Contractor -Security-Controls, is in the format of an electronic questionnaire that includes a dropdown menu that allows the user to select the version of the CSPSA associated with the security control level applicable to the immediate contract.
13 System Security Plan The contractor shall develop and maintain a security plan to identify key information about the contractor site and about the security controls that shall be used to ensure that IRS information is adequately safeguarded. Security plans are designed to document the security controls surrounding an information system environment. The contractor security plan shall ensure that security controls surrounding the contractor site environment have been adequately documented and safeguard mechanisms are in place. Each year, the contractor shall provide a State of Security Package, that includes a contractor System Security Plan (SSP) to the IRS. The SSP will include the following: Administrative Information Cover: Include information such as contractor name, location of facilities handling IRS SBU information or information systems, points of contract (e.g., Project Manager, Information System Administrator, Security Officer) (to include telephone number and address), contract/order number, period(s) of performance, dollar value (by performance periods), business size and socioeconomic characteristics, etc. Employee Roster: Identify all contractor employees working on the contract, and annotate those that have access to or handle SBU information, or have access to or operate or work with information systems containing SBU information. In addition, verify which contractor employees have or have not completed the current annual requirements for the Security Awareness Training. Subcontractor Support: Names and addresses of contractor and all subcontractors performing IRS work. Infrastructure Diagram: Provide a diagram providing a general picture of the IT assets being used. Inventory of IT Assets: Provide an inventory of the type of equipment being used, including IT equipment/component, number of components, associated serial numbers, and location. Additional reference information for completing a security plan can be obtained from the NIST Web site: NIST SP Revision 1, Developing Security Plans for Federal Information Systems.
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Publication 4812. Contractor Security Controls
Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** July 2014 Highlights of Publication 4812
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) System Categorization: Moderate Version 1.5 May 30, 2013 Prepared by: Security & Compliance Services (SCS) and Infrastructure
Publication 4812. Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites***
Information Technology CYBERSECURITY Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** Publicationn
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
United States Patent and Trademark Office
U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office FY 2009 FISMA Assessment of the Patent Cooperation Treaty Search Recordation System (PTOC-018-00) Final
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh [email protected] System Owner: Ganesh Reddy [email protected] Office of Federal Student
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This
In Brief. Smithsonian Institution Office of the Inspector General. Smithsonian Institution Information Security Program
Smithsonian Institution Office of the Inspector General Smithsonian Institution In Brief Report Number A-11-05, May 15, 2012 Why We Did This Audit The Federal Information Security Management Act of 2002
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
OSAC Committees are as follows: Threats and Information Sharing; Country Council and Outreach; and Security Awareness and Innovation.
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
Phase I Conduct a Security Self-Assessment
61 The SEARCH IT Security Self- and Risk- Assessment Tool: Easy to Use, Visible Results To complete your self-assessment, you can use the questions we have adopted and revised from the NIST guidance under
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Requirements For Computer Security
Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
5 FAH-8 H-351 CLOUD COMPUTING
5 FAH-8 H-350 CLOUD COMPUTING (Office of Origin: IRM/BMP) 5 FAH-8 H-351 CLOUD COMPUTING GOVERNANCE BOARD a. The Cloud Computing Governance Board (CCGB) exists to provide advice to the Authorizing Official
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Standard Operating Procedure Information Security Compliance Requirements under the cabig Program
Page 1 of 9 Pages Standard Operating Procedure Information Security Compliance Requirements under the cabig Program This cover sheet controls the layout and components of the entire document. Issued Date:
Department of Homeland Security Office of Inspector General. Audit of Application Controls for FEMA's Individual Assistance Payment Application
Department of Homeland Security Office of Inspector General Audit of Application Controls for FEMA's Individual Assistance Payment Application OIG-09-104 September 2009 Table of Contents Objectives,
Department of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
In Brief. Smithsonian Institution Office of the Inspector General
In Brief Smithsonian Institution Office of the Inspector General Smithsonian Institution Network Infrastructure (SINet) Report Number A-09-01, September 30, 2009 Why We Did This Audit Under the Federal
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Cardinal Intellectual Property (CIP) Patent Cooperation Treaty Search Recordation System (PCTSRS) DOC50PAPT0601026
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Questions for Vermont Hosting RFI
Questions for Vermont Hosting RFI 1. Will the physical Oracle RAC servers be able to be picked up and moved to the new data center location or will new servers need to be purchased? SOV Response: New servers
014-00-01-01-01-1146-00. Mixed Life Cycle FY2002
Consolidated American System (CAPPS) and Interagency e Migration Exhibit 300: Part I: Summary Information and Justification (All Capital Assets) I.A. Overview 1. Date of Submission: 2. Agency: Department
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0 April 28, 2013 Prepared by: Office of the Comptroller of the Currency (OCC) Security & Compliance Services (SCS) DOCUMENT
DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer
DEPARTMENT OF THE INTERIOR Privacy Impact Assessment Guide Departmental Privacy Office Office of the Chief Information Officer September 30, 2014 Table of Contents INTRODUCTION... 1 Section 1.0 - What
Template K Implementation Requirements Instructions for RFP Response RFP #
Template K Implementation Requirements Instructions for RFP Response Table of Contents 1.0 Project Management Approach... 3 1.1 Program and Project Management... 3 1.2 Change Management Plan... 3 1.3 Relationship
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19,dated 07/07/2005 GUIDANCE
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Were there other system changes not listed above? No 3. Check the current ELC (Enterprise Life Cycle) Milestones (select all that apply)
Date of Approval: October 9, 2015 PIA ID Number: 1448 A. SYSTEM DESCRIPTION 1. Enter the full name and acronym for the system, project, application and/or database. AIMS Centralized Information System,
2014 Audit of the Board s Information Security Program
O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Enterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
OFFICE OF INSPECTOR GENERAL. Audit Report. Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security
OFFICE OF INSPECTOR GENERAL Audit Report Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security Report No. 08-04 September 26, 2008 RAILROAD RETIREMENT BOARD INTRODUCTION
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector
U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY. HUD Handbook 2400.25 REV4.1
U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY HUD Handbook 2400.25 REV4.1 March 2016 Document Change History Version Number Date Description Author 2.0 November
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:
State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
Department of Veterans Affairs VA HANDBOOK 6500.6 CONTRACT SECURITY
Department of Veterans Affairs VA HANDBOOK 6500.6 Washington, DC 20420 Transmittal Sheet MARCH 12, 2010 CONTRACT SECURITY 1. REASON FOR ISSUE: This Handbook establishes the procedures to implement security
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Standard Operating Procedure
Standard Operating Procedure IT System Certification & Accreditation Process For Effective Date: 20080707 Expiration Date: 20110707 Responsible Office: Office of the Chief Information Officer Document
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Integrated Financial Management Information System (IFMIS) Merger
for the Information System (IFMIS) Merger DHS/FEMA/PIA-020 December 16, 2011 Contact Point Michael Thaggard Office of Chief Financial Officer (202) 212-8192 Reviewing Official Mary Ellen Callahan Chief
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
Privacy Impact Assessment
For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 [email protected] System Owner: Keith
