Standard Operating Procedure
|
|
|
- Olivia Walters
- 10 years ago
- Views:
Transcription
1 Standard Operating Procedure IT System Certification & Accreditation Process For Effective Date: Expiration Date: Responsible Office: Office of the Chief Information Officer
2 Document Change and Review History
3 Table of Contents 1.0 Introduction Certification and Accreditation Web Portal Process Step Format & Acronyms Role-Based Addresses Certification & Accreditation Process Phase I - Security Categorization & SSP Documentation Phase II - IT Security Documentation Preliminary Review Phase III - Certification Phase IV - Accreditation Package...: Approval...10 Appendix A: C&A Web Portal...11 Appendix B: Roles and Responsibilities...12
4 1.0 Introduction The NASA Certification and Accreditation (C&A) program follows OMS and National Institute of Standards and Technology (NIST) standards and guidelines pertaining to information technology systems security. These document sets outlines the general process for achieving certification and accreditation of Federal Government computer systems. This SOP defines the specific NASA procedure and timeline for C&A of NASA computer systems in accordance with the OMS and NIST guidance. 2.0 Certification and Accreditation Web Portal The most recent version of all forms, checklists, and documentation referenced in this SOP can be located via the "Certification and Accreditation" section of the NASA "Office of the Chief Information Officer" (OCIO) website: You are encouraged to visit the C&A Web Portal regularly to keep up-to-date with the NASA C&A program, policies, procedures, guidance, supporting forms, and NIST documents. 3.0 Process Step Format & Acronyms Acronyms for key individuals within the NASA certification and accreditation process are provided below. Step #: AO CA CAO CAPM ISO ITSM NSSPR OC OCSO PCAO PO [role associated with the process step]; details of the process step - Authorizing Official - Certification Agent Certification and Accreditation Official Certification and Accreditation Program Manager - Information System Owner Information Technology Security Manager NASA System Security Plan Repository (currently RMS) NSSPR Operations Center Organizational Computer Security Official Principal Certification and Accreditation Official Package Owner Figure 1 - Acronym Key 4.0 Role-Based Addresses NSSPR Operational Support - [email protected] 1
5 5.0 Certification & Accreditation Process 5.1 Phase I - Security Categorization & SSP Documentation The Security Categorization & SSP Documentation phase addresses those actions performed by the Information System Owner (ISO), Organizational Computer Security Official (OCSO), IT Security Manager (ITSM), and Certification & Accreditation Official (CAO) that categorize and generate the IT security documentation required for certification and accreditation. Step 1.1: [ISOIOCSOIITSM] The ISO for the system to be certified and accredited, with guidance and direction from their local OCSO and ITSM, will derive the system security categorization per ITS-SOP "Procedure for the FIPS-199 Categorization of IT Systems", Federal Information Processing Standard (FIPS) 199, and NIST SP Document the resulting security categorization in the "SYSTEM SECURITY CATEGORIZATION RECORD" located via the C&A Web Portal. The ISO should work with application owners and/or information owners to ensure that all information on the system is identified and incorporated when deriving the system security category. Step 1.2: [ISO] The ISO for the system to be certified will fill out the "REQUEST FOR CAO VALIDATION OF SECURITY CATEGORIZATION" form located via the C&A Web Portal. Step 1.3: [ISO] The ISO will the completed "REQUEST FOR CAO VALIDATION OF SECURITY CATEGORIZATION" form, the "SYSTEM SECURITY CATEGORIZATION RECORD", and any supporting documentation to the local Center CAO. When submitting the above forms to the CAO use the following naming conventions: 1) Name the "Subject" field of the using the following format: Format: CAOVR-SC: <ITSSP name> Example: CAOVR-SC: Code A Windows Systems 2) Name the "SYSTEM SECURITY CATEGORIZATION RECORD" file using the following format: Format: SCR <ITSSP name> Example: SCR Code A Windows Systems 2
6 3) Name the "REQUEST FOR CAO VALIDATION OF SECURITY CATEGORIZATION" file using the following format: Format: CAOVR-SC <ITSSP name> Example: CAOVR-SC Code A Windows Systems Step 1.4: [CAOIITSM/OCSO/ISO/AO] The CAO, in coordination with the ITSM and/or OCSO, will review the submitted security categorization documentation and issue a "concur" or "non-concur" response to the ISO by completing and signing the "REQUEST FOR CAO VALIDATION OF SECURITY CATEGORIZATION". If Concur If Non-Concur response confirms the categorization and allows for the system to continue with the C&A process. Go to Step 1.5. response will be accompanied with a non-concur justification. The ISO then has the option to: Re-categorize the system based on the CAO recommendation or Arrange a meeting with the system Authorizing Official (AO), the CAO, OCSO, and the ITSM to determine a resolution. The certification cannot proceed until a resolution is accepted by the AO and the CAO. Step 1.5: [CAO/ISOIITSM] The CAO returns the approved "REQUEST FOR CAO VALIDATION OF SECURITY CATEGORIZATION" form, along with any supporting documentation, to the ISO. The ITSM is copied on this response so that they are notified that a new System Security Plan (SSP) certification package has been approved for generation in the NASA System Security Plan Repository (NSSPR). Once the certification package has been generated the ISO uploads the approved "REQUEST FOR CAO VALIDATION OF SECURITY CATEGORIZATION" form and the "SYSTEM SECURITY CATEGORIZATION RECORD" to the NSSPR as artifacts of the certification package. Step 1.6: [ISOIITSM] The ISO will identify users who require access to the NSSPR. The ISO will apply for NSSPR accounts by completing the appropriate NSSPR ACCESS REQUEST form, located via the C&A Web Portal, and submitting it to the local Center ITSM. All users for whom an account is requested must have a current PKI certificate. 3
7 Step 1.7: [ITSM/OC] ITSM will review and approve or decline account creation. If Approved If Declined ITSM will or fax the account information to the Operations Center (OC) for the NSSPR. ITSM will provide justification for rejection and return the form to the requester via or fax. The requester may resubmit the account request after addressing the ITSM's concerns. Step 1.8: [~C] The OC will create the accounts and send an encrypted to the new users with their username and password within one (1) week of receipt of the NSSPR ACCESS REQUEST Form. Step 1.9: [ITSM] The ITSM will generate the SSP certification package within the NSSPR. Note that the ITSM can delegate this portion of the process to the ISO, OCSO, a local C&A plan writing team, or anyone else they deem appropriate for this role. Requirement: When generating the SSP certification package the following naming convention is a NASA procedural requirement: Format: <ITS-SOP-0007 System Designation> <System Name> Example: AR-999-L-ARC-0103 Code A Windows Systems Step 1.10: [ISOIITSM/OCSO] The ISO, with guidance and direction from their local ITSM via their OCSO, populates the System Security Plan (SSP) certification package within the NSSPR. Once an SSP certification package is created, the ISO will continue populating it using the template, formats, requirements, etc. that were in effect at the time the certification package was created. Version numbers of templates or requirements used should be clearly noted where relevant in the SSP certification package. If a template or requirements change during this process, compliance with new requirements or formats should be noted as a required action in the system's Plan of Actions and Milestones (POA&M), with a completion date of no later than one year from the date of the system's new Authorization to Operate. 4
8 Step 1.11: [ISO/OCSO] The ISO, in coordination with the OCSO, uses the "CERTIFICATION PACKAGE REVIEW CHECKLIST" (CPRC), downloaded via the C&A Web Portal, to verify that the package is ready for Certification Review. If any significant issues exist they must be corrected prior to continuing the Certification Review process. Minor issues can be documented in the Checklist with recommendations for correction. The "CERTIFICATION PACKAGE REVIEW CHECKLIST" is then uploaded to the NSSPR as an artifact of the certification package. Format: Prior to uploading the above form to the NSSPR name the file using the following naming conventions: CPRC <ITS-SOP-0007 System Designation> <System Name> Example: CPRC AR-999-L-ARC-0103 Code A Windows Systems Step 1.12: [ISO/CAO] The ISO notifies the CAO via that the package is ready for Certification Review. When submitting the above notification to the CAO use the following naming convention: Name the "Subject" field of the using the following format: Format: CPRC: <ITS-SOP-0007 System Designation> <System Name> Example: CPRC: AR-999-L-ARC-0103 Code A Windows Systems 5
9 5.2 Phase II - IT Security Documentation Preliminary Review The IT SSP Preliminary Review phase addresses those actions performed by the CAO associated with reviewing the SSP certification package to ensure that all required IT Security documentation has been generated properly and is complete. Step 2.1: [CAO] The CAO logs into the NSSPR and, using the "CERTIFICATION PACKAGE REVIEW CHECKLIST" submitted by the ISO, verifies that the certification package meets requirements. The CAO documents any variances in the "Certification Review Variance Dispositioning" section of the CPRC. Step 2.2: [CAO] Is the Certification Package acceptable for continued processing? If Yes If No - go to Step go to Step 2.3 At this point in the process, if time constraints are tight towards meeting ATO deadlines, the remainder of Phase 2.0 can be performed in parallel with Phases 3.0 and 4.0. In cases such as this only "significant variances" should prevent the initiation of the "Independent Certification Contract" in Phase 3.0 and the subsequent "SSP Review" process in Phase 4.0. Being that the SSP Review phase primarily concerns an initial review of the SP controls suite a gross lack of proper documentation relative to the control suite would be an example of a significant variance that could prevent continued processing. Resolution of other identified variances contained within the larger scope of the SSP, as documented in the "CERTIFICATION PACKAGE REVIEW CHECKLIST", should be worked concurrently with Phases 3.0 and 4.0. The goal is the generation of an SSP that is as compliant as possible with policy, procedures, standards, and guidelines, prior to the IDCCT visiting the site as outlined below in Phase 6.0. Step 2.3: [CAO/ISO] The CAO notifies the ISO that the Certification Package is not acceptable for continued certification processing and instructs the ISO to correct variances per instruction the CAO has documented in the "CERTIFICATION PACKAGE REVIEW CHECKLIST". Step 2.4: [ISO] ISO corrects variances per instructions from CAO, completes the "Certification Review Variance Dispositioning" section of the CPRC, and returns it to the CAO. 6
10 Step 2.5: [ISO/CAO] The ISO notifies the CAO that the variances have been corrected and the package is ready to resume the Certification Review process. Step 2.6: [CAO] The CAO verifies that the variances have been corrected. Is the Certification Package acceptable for continued processing? If Yes - go to Step 3.1 If No - go to Step 2.3 If No agreement can be reached go to Step 2.7 Step 2.7: [ISO/CAOIITSM/AO] In the event that an agreement cannot be reached between the ISO and the CAO concerning the acceptability of the Certification Package, the ISO will arrange a meeting between the ISO, CAO, ITSM, and AO (at a minimum) to determine how to proceed. The AO is required to make a decision about whether to continue the certification process with or without addressing the CAO concerns. If AO chooses to not address CAO concerns, the CAO will document the decision, receive a signature of the decision from the AO on the CPRC, and upload the documented decision and CPRC as artifacts to the SSP certification package - proceed to Step 3.1 If AO chooses to address CAO concerns - go to Step
11 5.3 Phase III - Certification Referring to the "Security Certification Phase" of NIST SP , "Guide for the Security Certification and Accreditation of Federal Information Systems", note that for systems with a security categorization of Low the Certification Phase consists of a "Self-Assessment" of the information systems security controls. In alignment with this, the CAO approved CERTIFICATION PACKAGE REVIEW CHECKLIST is deemed synonymous with the Security Assessment Report that is the core deliverable for the Certification Phase, as it requires both the SO and CAO to review all documentation pertinent to validating the security posture of the system. The SO should insure, prior to submitting the CERTIFICATION PACKAGE REVIEW CHECKLIST to the CAO for review, that all standards, guidelines, procedures, and processes reflected in the documents referenced in the checklist have indeed been implemented and fulfilled as stated. 5.4 Phase IV - Accreditation Package The accreditation package phase includes creation of the accreditation package and submission of the package to the AO. Step 4.1: [ISO] The ISO will create an accreditation package for the AO. The accreditation package includes (at a minimum): Executive summary to the AO: Short summary of the findings Actions taken to address findings Risks AO is accepting ISO's recommendation for ATO, IATO, or DATO System Security Plan (SSP) Security Assessment Report (SAR) Plan of Actions and Milestones (POA&M) For systems with a "Low" security categorization the CAO approved "Certification Package Review Checklist" serves as the SAR. Step 4.2: [AO/ISO] The AO will review the certification package, make an accreditation decision (see NPR A, section ), and complete the Authorization to Operate (ATO), Interim ATO (IATO), or Denial of ATO (DATO) form available via the C&A Web Portal. The AO will then forward the accreditation decision to the ISO. Is the AO decision to operate? If Yes - go to step 4.4 If No - go to step 4.3 8
12 The AO may seek consultation with the ITSM, GAO, OGSO or others tangential to the G&A process, prior to making a final decision towards accreditation of the system. If so, the AO should be provided with pertinent information that details the residual risk to NASA missions, assets, or personnel associated with operation of the system. Step 4.3: [ISO] The ISO will input the decision letter into NSSPR and cease operation of the system. Step 4.4: [ISO] The ISO will input the decision letter into NSSPR and begin or continue operation of the system. Certification and Accreditation Process Complete 9
13 6.0 Approval Jerr L. D vis Deputy CI IT Security Senior Agency Information Security Officer Date 10
14 Appendix A: C&A Web Portal Please visit the "Certification and Accreditation" section of the NASA "Office of the Chief Information Officer" (OCIO) website for all documents referenced in this SOP. The C&A section can be accessed directly via the following link: 11
15 Appendix B: Roles and Responsibilities OCIO Responsibilities: OCIO is responsible for developing NASA C&A policies and procedures for unclassified IT systems. In addition OCIO has responsibility for the implementation, tracking, and enforcement of Federal and NASA C&A requirements. These responsibilities include the following: NASA C&A Program Management: The NASA C&A Program Manager is responsible for implementing and managing the NASA C&A program, as described below, with the help of the NASA Principal Certification & Accreditation Official (PCAO), Center Certification & Accreditation Officials (CAO), Center ITSM's, and the Independent Certification Project Manager (ICPM). Agency Principal Certification & Accreditation Official (PCAO): Function as lead and POC for all Center CAO's. Liaison between Agency C & A Program Manager and Center CAO's. Execute wide variety of tasks as identified and assigned by the Program Manager for C&A. Facilitates development of Agency C&A policies and procedures. Lead weekly Agency C & A telecoms that address C&A related topics, issues, and concerns. Manage Agency E-forms development, implementation, & maintenance integral to C&A Facilitates development and management of Agency C&A web site hosted by OCIO. Attend and facilitate C&A related tracts for Agency ITSM Conferences. Directly or indirectly resolves C&A related issues and concerns as brought forth from various points throughout the Agency via CAO's and others tangential to the C&A process. Center Certification & Accreditation Official (CAO): This group is coordinated by the NASA Principal CAO who performs this function on behalf of OCIO. Management, facilitation, and tracking of all certifications and accreditations for their Center. Primary point of contact for all local C&A-related questions, issues, and concerns. Primary POC for all local RMS content change requests. Facilitate training and awareness relative to C&A requirements, procedures, and processes. Review & Validate system security categorizations. Certification cost review to assure system components are in-line with independent certification cost estimates. Facilitation, coordination, and POC for all independent system certifications at their Center. Facilitation and coordination of communication between independent certifiers, independent certification contract, and SO's. Verification of certification package including review of all Center SSP's and associated documentation for concurrence with Agency, NIST, OMB and other Federal Policies, Procedures, Standards, and Guidelines. Document variances and recommended corrective measure in the Certification Package Review Checklist. Facilitate generation of Plan of Action and Milestones (POA&M) in coordination with Center ITSM, SO, and AO. Tracking and Review of the annual assessments of Continuous Monitoring controls. Facilitate External Systems reviews and assessments. Monthly (or more frequent) coordination and status meetings with Center ITSM and CIO. 12
16 cia / ITSM: Each Center Cia, ITSM, and CAO should work closely together to ensure questions and concerns are resolved early in the C&A process. Center Cia's, through their ITSM's, are responsible for the following: Reviewing C&A documentation and decisions. Tracking the progress of systems in meeting C&A requirements. Tracking systems' Plans of Actions and Milestones (POA&M). Enforcing C&A requirements as necessary. Managing the NASA Independent Certification Contract Development and Management of C&A related SOPs Managing the "Certification and Accreditation" section of the NASA "Office of the Chief Information Officer" (OCIO) website. Managing the "NASA System Security Plan Repository" (NSSPR) Managing the Agency POA&M process and tool(s) C&A of OAIT, Multi-Program funded systems, and OCIO/Center systems - As NASA organizations, NASA OCIO and each Center OCIO has the responsibility of meeting C&A requirements for the relevant OAIT, Multi-Program funded systems, and Center information systems. 13
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
IT Security Handbook. Security Awareness and Training
IT Security Handbook Security ITS-HBK-2810.06-01 Effective Date: 20110506 Expiration Date: 20140430 Responsible Office: OCIO/ Deputy CIO for Information Technology Security Distribution: ITS Handbook (ITS-HBK-2810.06-01)
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
NASA Information Technology Requirement
NASA Information Technology Requirement NITR 2810-17 Effective Date: November 12, 2008 Expiration Date: May 16, 2011 System Maintenance Policy and Procedures Responsible Office: Office of the Chief Information
EPA Classification No.: CIO-2150.3-P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM SECURITY ASSESSMENT AND AUTHORIZATION PROCEDURES V2 JULY 16, 2012 1. PURPOSE The
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Office of the Chief Information Security Officer Version 10 September 16, 2013 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM
CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE August 25, 2009 Version
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 10 [June 6, 2013] TABLE OF CONTENTS 1.0 Introduction... 7 1.1 Background... 7 1.2 Purpose... 8 1.3 Scope...
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
SECURITY ASSESSMENT AND AUTHORIZATION
SECURITY ASSESSMENT AND AUTHORIZATION INFORMATION SYSTEM SECURITY ASSESSMENT AND AUTHORIZATION PROCESS CHAPTER 02 ITS-HBK-2810.02-02 HANDBOOK EFFECTIVE DATE: 20150201 EXPIRATION DATE: 20180201 RESPONSIBLE
How To Evaluate A Dod Cyber Red Team
CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 CJCSM 6510.03 DISTRIBUTION: A, B, C DEPARTMENT OF DEFENSE CYBER RED TEAM CERTIFICATION AND ACCREDITATION Reference(s): Enclosure F. 1. Purpose a. This manual,
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
Lots of Updates! Where do we start?
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project Management Community Meeting October 18, 2011 .
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Information Security Office Version 8.0 June 06, 2011 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM SECURITY OFFICER (ISSO)
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
IT Security Handbook. Planning: Information System Security Plan Template, Requirements, Guidance and Examples
IT Security Handbook Planning: Information System Security Plan Template, Requirements, Guidance and Examples ITS-HBK-2810.03-02 Effective Date: 20110209 Expiration Date: 20150716 Responsible Office: OCIO/
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Privacy Impact Assessment
Technology, Planning, Architecture, & E-Government Version: 1.1 Date: April 14, 2011 Prepared for: USDA OCIO TPA&E Privacy Impact Assessment for the April 14, 2011 Contact Point Charles McClam Deputy Chief
Department of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
CMS INFORMATION SECURITY ASSESSMENT PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS INFORMATION SECURITY ASSESSMENT PROCEDURE March 19, 2009 Version 2.0- Final Summary of Changes in CMS
Special Permits Program Desk Guide
Special Permits Program Desk Guide Version 2.2 March 2016 Approvals Program Standard Operating Procedures Version 1.0 i Disclaimer The materials contained in this document consist of guidance and other
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
CYBER SECURITY PROCESS REQUIREMENTS MANUAL
MANUAL DOE M 205.1-5 Approved: Admin Chg 1: 9-1-09 Admin Chg 2: 12-22-09 CYBER SECURITY PROCESS REQUIREMENTS MANUAL U.S. DEPARTMENT OF ENERGY Office of the Chief Information Officer AVAILABLE ONLINE AT:
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment
HHS OCIO Policy for Information Technology (IT) Enterprise Performance Life Cycle (EPLC)
Office of the Chief Information Officer Office of the Assistant Secretary for Resources and Technology Department of Health and Human Services HHS OCIO Policy for Information Technology (IT) Enterprise
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
National Geospatial Data Policy Procedure for Geospatial Metadata Management
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 National Geospatial Data Policy Procedure for Geospatial Metadata Management 1. PURPOSE The purpose of the Procedure
United States Department of Agriculture. Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP) NIST June 5, 2013 Matt Goodrich, JD FedRAMP, Program Manager Federal Cloud Computing Initiative OCSIT GSA What is FedRAMP? FedRAMP is a government-wide
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2
Vendor Access Management
Vendor Access Management ProPath Office of Information and Technology Table of Contents Vendor Access Management Process Map... 1 Process: Vendor Access Management... 2 Vendor Access Management Description
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 206.2 Approved: SUBJECT: IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT (ICAM) 1. PURPOSE. To establish requirements and responsibilities for DOE s identity,
UCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs)
Health Affairs Information Systems University of California, Irvine UCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs) April 11, 2012 Version 1.1 HAIS Coordination Copy The
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Plan of Action and Milestones (POA&M) Training Session
Plan of Action and Milestones (POA&M) Training Session Jamie Nicholson IM-31, Policy, Guidance, & Planning Division U.S. Department of Energy Office of the Associate CIO for Cyber Security 1 Objectives
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Document Control. DOWNLOADED AND/OR HARD COPY UNCONTROLLED Verify that this is the correct version before use.
DOWNLOADED AND/OR HARD COPY UNCONTROLLED Verify that this is the correct version before use. AUTHORITY DATE Jeffrey Northey (original signature on file) IMS Manager 10/16/2014 Richard Grigg (original signature
OPM System Development Life Cycle Policy and Standards. Table of Contents
Table of Contents 1. INTRODUCTION... 4 1.1 Purpose... 4 1.1.1 OPM SDLC Policy... 4 1.1.2 Key Concepts and Principles... 4 1.2 Scope and Applicability... 5 1.3 Compliance, Enforcement and Exceptions...
CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP
ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B2490021-2015.
ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B2490021-2015. This addendum is applicable to each purchase order that is subject to the State of Maryland s contract number 060B2490021-2015.
Defense Security Service
Defense Security Service Industrial Security Field Operations Office of the Designated Approving Authority Manual for the Certification and Accreditation of Classified Systems under the NISPOM Version
Cyber Security Assessment & Management (CSAM) CSAM C&A web
Cyber Security Assessment & Management (CSAM) CSAM C&A web Introduction to CSAM 1 CSAM C&A Web Solution The CSAM C&A Web solution is an enterprise-wide tool for: Leveraging guidance from the Office of
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
PPM V2.0 Frequently Asked Questions (FAQs) U.S. Department of Housing and Urban Development
PPM V2.0 Frequently Asked Questions (FAQs) U.S. Department of Housing and Urban Development December 2015 1. Getting Started with PPM Life Cycle 2. PPM Life Cycle Process 3. PPM V2.0 and Project Types
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
United States Patent and Trademark Office
U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office FY 2009 FISMA Assessment of the Patent Cooperation Treaty Search Recordation System (PTOC-018-00) Final
Protected Critical Infrastructure Information Management System (PCIIMS) Final Operating Capability (FOC)
for the Protected Critical Infrastructure Information Management System (PCIIMS) Final Operating Capability (FOC) DHS/NPPD/PIA-006(a) Contact Point Tammy Barbour Protected Critical Infrastructure Information
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
Organization. Project Name. Project Overview Plan Version # Date
Project Overview Plan Template Organization Project Name Project Overview Plan Version # Date REVISION HISTORY VERSION # REVISION DATE COMMENT 1 APPROVALS: Authorized Signature DATE 2 Table of Contents
How To Renew A Contract At Mymellanox Online Via Mymllanox
Mellanox Online Renewal System- Frequently Asked Questions The Frequently Asked Questions (FAQs) and their responses are grouped into categories. Please click on the topic that you would like to learn
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
DEPARTMENTAL DIRECTIVE
ADMINISTRATIVE COMMUNICATIONS SYSTEM U.S. DEPARTMENT OF EDUCATION DEPARTMENTAL DIRECTIVE OM:5-101 Page 1 of 17 (07/16/2010) Distribution: All Department of Education employees Approved by: /s/ Winona H.
Department of Administration Portfolio Management System 1.3 June 30, 2010
E 06/ 30/ 2010 EX AM PL 1. 3 06/ 28/ 2010 06/ 24/ 2010 06/ 23/ 2010 06/ 15/ 2010 06/ 18/ 2010 Portfolio System 1.3 June 30, 2010 Contents Section 1. Project Overview... 1 1.1 Project Description... 1 1.2
Assessment and Authorization
Assessment and Authorization ProPath Office of Information and Technology Table of Contents Assessment and Authorization Process Maps... 1 Process: Assessment and Authorization... 5 Assessment and Authorization
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Nuclear Regulatory Commission Computer Security Office CSO Office Instruction
Nuclear Regulatory Commission Computer Security Office CSO Office Instruction Office Instruction: Office Instruction Title: CSO-PLAN-0100 Enterprise Risk Management Program Plan Revision Number: 1.0 Effective
PERSONALLY IDENTIFIABLE INFORMATION (Pin BREACH NOTIFICATION CONTROLS
ClOP CHAPTER 1351.19 PERSONALLY IDENTIFIABLE INFORMATION (Pin BREACH NOTIFICATION CONTROLS TABLE OF CONTENTS SECTION #.1 SECTION #.2 SECTION #.3 SECTION #.4 SECTION #.5 SECTION #.6 SECTION #.7 SECTION
Approvals Program Desk Guide
Approvals Program Desk Guide Version 2.2 March 2016 Approvals Program Standard Operating Procedures Version 1.0 i Disclaimer The materials contained in this document consist of guidance and other information
Software and Hardware Configuration Management
DOWNLOADED AND/OR HARD COPY UNCONTROLLED Verify that this is the correct version before use. AUTHORITY DATE Jeffrey Northey (original signature on file) IMS Manager 07/09/2014 Doug Dorrer (original signature
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
Security Control Standard
Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012
Monitoring in a Risk Management Framework US Census Bureau Oct 2012 Agenda Drivers for Monitoring What is Monitoring Monitoring in a Risk Management Framework (RMF) RMF Cost Efficiencies RMF Lessons Learned
Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development
Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
AODR Role-Based Training. Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security
AODR Role-Based Training Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security 1 Objectives Gain Understanding and Working Knowledge of: AODR Authority, Role
Battery Program Management Document
Battery Program Management Document Revision 5.8 May 2014 CTIA Certification Program 1400 16 th Street, NW, Suite 600 Washington, DC 20036 e-mail: [email protected] Telephone: 1.202.785.0081 www.ctia.org/certification
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
SIGNIFICANT CHANGES DOCUMENT
SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY 2012. Report No. 4A-CI-00-12-016
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY 2012 Report No. 4A-CI-00-12-016 Date:
