CMS Master Security Plan

Size: px
Start display at page:

Download "CMS Master Security Plan"

Transcription

1 Office of the Chief Information Security Officer Centers for Medicare & Medicaid Services 7500 Security Boulevard Baltimore, Maryland CMS Master Security Plan FINAL Version 6.00 June 25, 2010 Document Number: CMS-CISO

2 CMS Master Security Plan CMS-CISO (This Page Intentionally Blank) ii June 25, Version 6.00 (FINAL)

3 CMS-CISO CMS Master Security Plan SUMMARY OF CHANGES IN CMS MASTER SECURITY PLAN VERSION ) Baseline Version. June 25, Version 6.00 (FINAL) iii

4 CMS Master Security Plan CMS-CISO (This Page Intentionally Blank) iv June 25, Version 6.00 (FINAL)

5 CMS-CISO CMS Master Security Plan TABLE OF CONTENTS 1 INTRODUCTION ORGANIZATIONAL REQUIREMENTS PM-1 Information Security Program Plan PM-2 Senior Information Security Officer PM-3 Information Security Resources PM-4 Plan of Action and Milestones Process PM-5 Information System Inventory PM-6 Information Security Measures of Performance PM-7 Enterprise Architecture PM-8 Critical Infrastructure Plan PM-9 Risk Management Strategy PM-10 Security Authorization Process PM-11 Mission/Business Process Definition CMS OVERVIEW Business Overview Systems Overview IT Operations Overview... Error! Bookmark not defined. 4 CMS INFORMATION SECURITY PROGRAM Risk Management Common s Continuous monitoring Enterprise Architecture LIST OF TABLES Table 1 Attachment I s and Types June 25, Version 6.00 (FINAL) v

6

7 CMS-CISO CMS Master Security Plan 1 INTRODUCTION The CMS Master Security Plan (MSP) is a complete replacement of the CMS Master Security Plan (Common Security s), dated April 17, It includes: Identification of CMS-wide organizational controls as defined in the Program Management (PM) family of controls required by the National Institute of Standards and Technology (NIST) Special Publication Revision 3, Recommended Security s for Federal Information Systems and Organizations. Complete reformatting of document content to facilitate correlation with federal program management requirements and ease of use, A complete listing of the common controls structure, both planned and implemented, at CMS; Identification of the responsible official for components of the program; References regarding how to obtain additional information; and An overview section addressing CMS, its business missions, systems, and IT operations is included for orientation purposes. 2 ORGANIZATIONAL REQUIREMENTS This section identifies the core requirements for organizational components of the security management program as defined by the NIST SP R3 Program Management (PM) of minimum controls. All of these controls are organizational level controls and apply throughout CMS. The s, Supplemental Guidance, and Related s sections of each reflect NIST SP R3 language except for specific cases where NIST specified CMS customizations were required. Within this section, please interpret references to the term organization as CMS (or your specific company or agency). The CMS Implementation section of each control explains the CMS control or directs the reader to the appropriate documentation for the control. 2.1 PM-1 INFORMATION SECURITY PROGRAM PLAN : The organization: a. Develops and disseminates an organization-wide information security program plan that: Provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements; June 25, Version 6.00 (FINAL) 1

8 CMS Master Security Plan CMS-CISO Provides sufficient information about the program management controls and common controls (including specification of parameters for any assignment and selection operations either explicitly or by reference) to enable an implementation that is unambiguously compliant with the intent of the plan and a determination of the risk to be incurred if the plan is implemented as intended; Includes roles, responsibilities, management commitment, coordination among organizational entities, and compliance; Is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation; b. Reviews the organization-wide information security program plan annually; and c. Revises the plan to address organizational changes and problems identified during plan implementation or security control assessments. Supplemental Guidance: The information security program plan can be represented in a single document or compilation of documents at the discretion of the organization. The plan documents the organization-wide program management controls and organization-defined common controls. The security plans for individual information systems and the organization-wide information security program plan together, provide complete coverage for all security controls employed within the organization. Common controls are documented in an appendix to the organization s information security program plan unless the controls are included in a separate security plan for an information system (e.g., security controls employed as part of an intrusion detection system providing organization-wide boundary protection inherited by one or more organizational information systems). The organization-wide information security program plan will indicate which separate security plans contain descriptions of common controls. Organizations have the flexibility to describe common controls in a single document or in multiple documents. In the case of multiple documents, the documents describing common controls are included as attachments to the information security program plan. If the information security program plan contains multiple documents, the organization specifies in each document the organizational official or officials responsible for the development, implementation, assessment, authorization, and monitoring of the respective common controls. For example, the organization may require that the Facilities Management Office develop, implement, assess, authorize, and continuously monitor common physical and environmental protection controls from the PE family when such controls are not associated with a particular information system but instead, support multiple information systems. Related control: PM-8. CMS Implementation: The security program plan is contained within the MSP and its attached and referenced documents. 2 June 25, Version 6.00 (FINAL)

9 CMS-CISO CMS Master Security Plan 2.2 PM-2 SENIOR INFORMATION SECURITY OFFICER : The organization appoints a senior information security officer with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program. Supplemental Guidance: The security officer described in this control is an organizational official. For a federal agency (as defined in applicable federal laws, Executive Orders, directives, policies, or regulations) this official is the Senior Agency Information Security Officer. Organizations may also refer to this organizational official as the Senior Information Security Officer or Chief Information Security Officer (CISO). CMS Implementation: The Director of the Office of the Chief Information Security Officer (OCISO) is the CMS CISO with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program. 2.3 PM-3 INFORMATION SECURITY RESOURCES : The organization: a. Ensures that all capital planning and investment requests include the resources needed to implement the information security program and documents all exceptions to this requirement; b. Employs a business case/exhibit 300/Exhibit 53 to record the resources required; and c. Ensures that information security resources are available for expenditure as planned. Supplemental Guidance: Organizations may designate and empower an Investment Review Board (or similar group) to manage and provide oversight for the information security-related aspects of the capital planning and investment control process. Related controls: PM-4, SA-2. CMS Implementation: Business owners are responsible for ensuring that capital planning and investment requests include the resources needed to implement the information security components within their systems. The Information Technology Investment Review Board (ITIRB) and Technical Review Board (TRB) provide oversight for this. 2.4 PM-4 PLAN OF ACTION AND MILESTONES PROCESS : The organization implements a process for ensuring that plans of action and milestones for the security program and the associated organizational information systems are maintained and document the remedial information security actions to mitigate risk to organizational operations and assets, individuals, other organizations, and the Nation. Supplemental Guidance: The plan of action and milestones is a key document in the information security program and is subject to federal reporting requirements established by June 25, Version 6.00 (FINAL) 3

10 CMS Master Security Plan CMS-CISO OMB. The plan of action and milestones updates are based on the findings from security control assessments, security impact analyses, and continuous monitoring activities. OMB FISMA reporting guidance contains instructions regarding organizational plans of action and milestones. Related control: CA-5. CMS Implementation: The Plan of Action and Milestones (POA&M) procedures are contained in the information security library, which is found at Automated tracking uses the CMS FISMA Tracking System (CFACTS). Contact for specific information. 2.5 PM-5 INFORMATION SYSTEM INVENTORY : The organization develops and maintains an inventory of its information systems. Supplemental Guidance: This control addresses the inventory requirements in FISMA. OMB provides guidance on developing information systems inventories and associated reporting requirements. CMS Implementation: The OCISO maintains the information systems inventory separately in a database. Contact [email protected] for specific information. 2.6 PM-6 INFORMATION SECURITY MEASURES OF PERFORMANCE : The organization develops, monitors, and reports on the results of information security measures of performance. Supplemental Guidance: Measures of performance are outcome-based metrics used by an organization to measure the effectiveness or efficiency of the information security program and the security controls employed in support of the program. CMS Implementation: Continuous monitoring, security assessments, common controls, and POA&M reporting form the basis for measuring the performance of the information security program. Contact [email protected] for specific information. 2.7 PM-7 ENTERPRISE ARCHITECTURE : The organization develops an enterprise architecture with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation. Supplemental Guidance: The enterprise architecture developed by the organization is aligned with the Federal Enterprise Architecture. The integration of information security requirements and associated security controls into the organization s enterprise architecture helps to ensure that security considerations are addressed by organizations early in the system development life cycle and are directly and explicitly related to the organization s mission/business processes. 4 June 25, Version 6.00 (FINAL)

11 CMS-CISO CMS Master Security Plan This also embeds into the enterprise architecture, an integral security architecture consistent with organizational risk management and information security strategies. Security requirements and control integration are most effectively accomplished through the application of the Risk Management Framework and supporting security standards and guidelines. The Federal Segment Architecture Methodology provides guidance on integrating information security requirements and security controls into enterprise architectures. Related controls: PL-2, PM-11, RA-2. CMS Implementation: The CMS Technical Reference Architecture (TRA) and its supplements define the enterprise architecture for CMS. The OCISO performs information security reviews and comments for all elements of TRA. 2.8 PM-8 CRITICAL INFRASTRUCTURE PLAN : The organization addresses information security issues in the development, documentation, and updating of a critical infrastructure and key resources protection plan. Supplemental Guidance: The requirement and guidance for defining critical infrastructure and key resources and for preparing an associated critical infrastructure protection plan are found in applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Related controls: PM-1, PM-9, PM-11, RA-3. CMS Implementation: Currently, there is no formal critical infrastructure plan. Developing one is a future, planned control. 2.9 PM-9 RISK MANAGEMENT STRATEGY : The organization: a. Develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems; and b. Implements that strategy consistently across the organization. Supplemental Guidance: An organization-wide risk management strategy includes, for example, an unambiguous expression of the risk tolerance for the organization, acceptable risk assessment methodologies, risk mitigation strategies, a process for consistently evaluating risk across the organization with respect to the organization s risk tolerance, and approaches for monitoring risk over time. The use of a risk executive function can facilitate consistent, organization-wide application of the risk management strategy. The organization-wide risk management strategy can be informed by risk-related inputs from other sources both internal and external to the organization to ensure the strategy is both broad-based and comprehensive. Related control: RA-3. June 25, Version 6.00 (FINAL) 5

12 CMS Master Security Plan CMS-CISO CMS Implementation: The CMS risk management strategy and related procedures are contained in the information security library ( PM-10 SECURITY AUTHORIZATION PROCESS : The organization: a. Manages (i.e., documents, tracks, and reports) the security state of organizational information systems through security authorization processes; b. Designates individuals to fulfill specific roles and responsibilities within the organizational risk management process; and c. Fully integrates the security authorization processes into an organization-wide risk management program. Supplemental Guidance: The security authorization process for information systems requires the implementation of the Risk Management Framework and the employment of associated security standards and guidelines. Specific roles within the risk management process include a designated authorizing official for each organizational information system. Related control: CA-6. CMS Implementation: The security authorization process is defined and delineated in the information security library located at To ensure that security authorization is integrated with CMS-wide risk management, there is one enterprise authorizing official, the CMS Chief Information Officer (CIO) PM-11 MISSION/BUSINESS PROCESS DEFINITION : The organization: a. Defines mission/business processes with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; and b. Determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until an achievable set of protection needs is obtained. Supplemental Guidance: Information protection needs are technology-independent, required capabilities to counter threats to organizations, individuals, or the Nation through the compromise of information (i.e., loss of confidentiality, integrity, or availability). Information protection needs are derived from the mission/business needs defined by the organization, the mission/business processes selected to meet the stated needs, and the organizational risk management strategy. Information protection needs determine the required security controls for the organization and the associated information systems supporting the mission/business processes. Inherent in defining an organization s information protection needs is an understanding of the level of adverse impact that could result if a compromise of information occurs. The security categorization process is used to make such potential impact 6 June 25, Version 6.00 (FINAL)

13 CMS-CISO CMS Master Security Plan determinations. Mission/business process definitions and associated information protection requirements are documented by the organization in accordance with organizational policy and procedure. Related controls: PM-7, PM-8, RA-2. CMS Implementation: Mission/business process definitions are contained within the CMS FISMA Tracking System (CFACTS). for identifying risk (both business and system risk), identifying the system security level, e-authentication level, and appropriate controls are in the information security library ( 3 CMS OVERVIEW 3.1 BUSINESS OVERVIEW CMS, an operating division of the Department of Health and Human Services (DHHS), is responsible for overseeing Medicare, Medicaid, the State Children s Health Insurance Program (SCHIP), and the Medicare-Approved Drug Discount Cards. CMS is the largest purchaser of health care in the world, and serves approximately one of every four Americans. Medicare, Medicaid, and SCHIP outlays, including state funding, represent approximately one-third of every dollar spent on health care in the United States. The Medicare and Medicaid entitlement programs, which finance health care for elderly, disabled, and low-income persons, are a result of the 1965 amendments to the Social Security Act (Title XVIII and XIX). Medicare was an extension of the social insurance concept of the Social Security cash benefits programs. Medicaid was conceived as a Federal/State partnership in both policy setting and funding and as part of the social safety net for eligible low-income persons. As the trusted custodian for one of the largest repositories of individual health care data in the world, CMS protects and ensures the security of all forms of patient and payment information regardless of how it is created, distributed, or stored. Continual advances in high-level inquiry languages, the use of smaller, faster computers, and high-speed access to the Internet for continued customer supports are challenges for the privacy of patient and payment information. CMS uses automated systems to support the Medicare and Medicaid programs. The Agency employs about 4,500 persons in the CMS Central Office (CO) facility located at 7500 Security Boulevard, Baltimore, Maryland and in ten (10) Regional Office (RO) locations around the country. However, this workforce is only a portion of the large and complex network that makes the CMS program work successfully. Traditionally, a number of external entities under provisions of Title XVIII have supported Medicare beneficiary and healthcare provider requirements. These consist of healthcare related organizations contractually supporting the policies, procedures, enrollment, entitlement, claims processing, account information queries, and other support functions. The Medicare Integrity Program (MIP), which was created under the Health Insurance Portability and Accountability Act (HIPAA) of 1996, enacted new authorities, which allow CMS to contract with entities beyond, but also including, our current Fiscal Intermediaries (FIs), and Carriers to perform specific program safeguard functions. CMS has established a number of Program Safeguard June 25, Version 6.00 (FINAL) 7

14 CMS Master Security Plan CMS-CISO Contractors (PSC) from a list of eligible and able contractors. CMS can issue, compete, evaluate, and award individual task orders among PSCs. These task orders are for some, all, or any sub-set of the work associated with the following payment safeguard functions: medical review, cost report audit, data analysis, provider education and fraud detection and prevention. The different types of traditional Medicare Fee-for-Service (FFS) contractor entities are defined as follows: Fiscal Intermediary (FI) A health insurance company that is nominated by a group or association of institutional providers of health care services, to make payments of covered Medicare services (Medicare Part A). Carrier A health insurance company that is selected (by competition or designation) by CMS to make payments to physicians and other practitioners for covered Medicare services (Medicare Part B). Durable Medical Equipment Regional Carrier (DMERC) A health insurance company that is selected (by competition or designation) by CMS to make payments to durable medical equipment suppliers. Regional Home Health Intermediary (RHHI) An FI designated by CMS to make payments for covered Medicare services to home health agencies and hospices. On December 8, 2003, the Medicare Prescription Drug, Improvement, and Modernization Act (MMA) of 2003 (PL ) was signed into public law by the President. This Act modernized Medicare and provided additional services to eligible recipients, such as a prescription drug discount program and other improved benefits. Section 911 of the MMA required a major reform of Medicare contracting provisions. CMS refers to this part of the MMA, and its implementation, as Medicare Contracting Reform. Congress goal is to create a Medicare administrative structure that is capable of meeting current and future health care delivery challenges. In July 2006, CMS began implementing its plan to modernize FFS claims processing. CMS plans to establish 15 Medicare administrative contractor (MAC) jurisdictions and to award a contract to a single contractor in each jurisdiction to take responsibility for processing both Part A and Part B claims. CMS also has established four MACs to process claims for durable medical equipment. Additional MACs are planned for the processing of home health and hospice (HH) claims. The transition of claims processing operations from FIs/Carriers/DMERCs/RHHIs to the MACs must be completed by October In addition to Medicare FFS Contracting Reform, CMS has started the modernization of the IT infrastructure because of the MMA legislation. In March 2006, CMS announced the selection of new Enterprise Data Centers (EDCs) contracts. The winners of the EDC procurement are EDS Corp., IBM Corp., and Companion Data Services LLC (CDS). These three contractors will compete for all future data center tasks through this Indefinite Quantity, Indefinite Deliverable (IDIQ) contract vehicle. These contracts are the hub of the new CMS Information Technology (IT) infrastructure for the next decade. All CMS software applications and hosting operations for Medicare, Medicaid, and SCHIP will ultimately be transitioned to the new EDCs over the next five years. CMS plans for the data center in the North Building in Baltimore to become a test and validation environment for the production operation housed at the EDCs. As an integral part of the CMS IT Modernization Initiative, the EDCs will help CMS: 8 June 25, Version 6.00 (FINAL)

15 CMS-CISO Further standardize the implementation of policy changes Establish better control of IT processes and procedures Allow additional e-government initiatives Reduce the CMS system security risk Support increasing health care processing workloads. Reduce cost CMS Master Security Plan To carry out its wide range of responsibilities, CMS works in partnership with many other entities to ensure beneficiaries have access to high quality care, including, but not limited to, the following: States, Territories, and Tribes, Other Federal agencies, Healthcare professionals and providers, Healthcare groups and associations, Beneficiary and consumer organizations, Accrediting bodies and researchers. 3.2 SYSTEMS OVERVIEW CMS tracks systems individually and the OCISO maintains the list of current systems in a database. For overview purposes only, the systems are discussed in groups that reflect the business mission(s) supported. Administrative Finance Systems A collection of automated systems that support consolidated budgetary and financial accounting functions. These applications serve as CMS s interface with Federal agencies such as DHHS, Treasury, and IRS on financial transactions. Customer Service Systems A collection of automated systems that directly provide the public with health care consumer information (e.g., CMS program eligibility and coverage, provider availability and quality, claim status). These systems make up CMS s e-gov presence. Health Care Quality Improvement Systems A collection of automated systems that facilitate the collaboration of CMS and the Quality Improvement Organizations to improve the health of Medicare beneficiaries. Activities involve analyzing data from various sources and changing the patterns of care to remedy widespread shortcomings in the health care system. Healthcare Integrated General Ledger Accounting System HIGLAS will replace the existing 52 separate accounting/payment systems for Medicare & Medicaid. HIGLAS June 25, Version 6.00 (FINAL) 9

16 CMS Master Security Plan CMS-CISO represents the consolidation of two major CMS projects within the office of the CMS Chief Financial Officer. The first project, the Integrated General Ledger and Accounting System (IGLAS) project, was initiated to improve the accounting & financial management processes used by CMS's Medicare contractors to administer the Medicare Parts A & B programs. The second project was an effort to improve the agency's central administrative accounting & financial management processes. These two activities were combined into the HIGLAS project. Human Resource Management Systems A collection of automated systems that support collection and maintenance of information about the CMS organization structure and workforce, and HR-related processes (e.g., travel, training, time and attendance). IT Management Systems A collection of automated systems that support business processes for which the Chief Information Officer is responsible. Medicare Advantage & Rx Plan Operation Systems A collection of automated systems that support collection and maintenance of beneficiary enrollments, premiums and payments for affordable health care and prescription drug coverage as legislated by Medicare Prescription Drug, Improvement and Modernization Act (MMA) of Medicaid & State Health Insurance Systems A collection of automated systems that support administration and funding of the Medicaid and State Children s Health Insurance programs, as well as drug pricing and rebate functions. Medicare Beneficiary Enrollment Systems A collection of automated systems that support the collection and maintenance of information (e.g., demographics, enrollment, insurance, premium payments) about Medicare Program beneficiaries. Medicare Claims Processing Systems A collection of automated systems that support the processing of bills and reimbursement claims for medical goods and services under the Medicare Program. Scope includes Standard Systems and Common Working File operations. Medicare Financial Management & Payment Systems A collection of automated systems that support Medicare Contractor workload and budget administration, and provider cost reporting. Medicare Utilization Data Collection & Access Systems A collection of automated systems that support the collection and analysis of Medicare and Medicaid Program enrollment and utilization data. Medicare Appeal Systems A collection of systems that support the appeals processes for Medicare Fee-for-Service and Managed Care. Payment Quality Review Systems A collection of automated systems that support the review of Medicare Program payments for medical goods and services. Quality review areas include, but may not be limited to overpayment, duplicate payment, fraud and abuse, monetary penalty tracking, and overall benefit savings. 10 June 25, Version 6.00 (FINAL)

17 CMS-CISO CMS Master Security Plan Procurement & Property Management Systems A collection of automated systems that support the identification, purchasing and management of agency property (e.g., office equipment and furniture, records, paper stock), as well as the awarding and management of contracts, grants, etc. used to acquire goods and services for the agency. Provider Enrollment Systems A collection of systems that support medical goods and services provider enumeration and enrollment in support of CMS health insurance programs. Retiree Drug Subsidy Systems A collection of systems that support the Medicare Retiree Drug Subsidy Provisions of the MMA. Integrated Data Repositories An enterprise resource designated to house entitlement, enrollment, utilization, quality and provider performance information, as well as data on physicians, providers, employer plans, Medicaid recipients, and Medicare secondary payers by storing one instance of timely, quality data/information, with multiple integrated views. Electronic Health Record Systems A collection of systems that supports web-based access to electronic health records. Medicaid Integrity Systems A collection of systems to facilitate the Medicaid integrity requirements, including prevention or detection of fraud, waste and abuse; data mining and analysis; audit of Medicaid payments for appropriateness; evaluation of provider enrollment with suspect background and behavior indicators; and claims review and provider audits. CMS IT Infrastructure This includes the Enterprise Data Centers (EDCs) systems which host CMS software and web applications for Medicare, Medicaid and SCHIP. The infrastructure houses mainframe computers, mid-tier computers, file/print servers, LAN/WAN network communications equipment, and Voice communications supporting CMS Central Office users and CMS remote partners. Wide Area Network (WAN) Services, Medicare Data Communications Network (MDCN), and CMSNet Medicare Data Communications Network (MDCN) is a private WAN managed by AT&T s Managed Data Network Services. MDCN supports the mission of CMS by providing the infrastructure for allowing communications and data transmission between CMS business related entities. CMSNet is the CMS private network that includes intranet and WAN components and will replace the MDCN as described in CMS Technical Reference Architecture - Wide Area Network (WAN) Services Supplement. Q-Net Quality Net (QNet) is an environment that uses shared database servers and WAN resources to monitor and improve utilization and quality of care for Medicare and Medicaid beneficiaries. 4 CMS INFORMATION SECURITY PROGRAM All CMS and CMS Partner IT systems (applications, platforms, services, and support infrastructure) are subject to FISMA reporting as either a system or subsystem. The CMS CISO maintains the list of these systems for this dynamically changing population in a database. Contact [email protected] for specific information. June 25, Version 6.00 (FINAL) 11

18 CMS Master Security Plan CMS-CISO CMS developed an Information Security (IS) Program to oversee and protect the complex and extensive CMS business environment. The CMS IS Program supports the CMS on-site and offsite systems (CMS systems operated/maintained at the CMS CO, ROs, or at off-site contractor facilities). It also supports the External Business Partner systems such as FIs, Carriers, DMERC s, MAC s, etc. The IS Program implementation is supported with the CMS Information Security website located at which contains the library of all CMS policies, procedures, standards and guidelines for the CMS Information Security Program ( This is a dynamically changing program, geared to achieving cost-effective, risk-based security measures in the constantly evolving landscapes of business missions, threat environments, and legislative and regulatory requirements. Non-CMS entities that process information on behalf of CMS, either directly or indirectly, must follow the CMS IS Program and additionally have, maintain and report on their program management controls (identified in section 2). NIST SP and SP Guide for Applying the Risk Management Framework to Federal Information Systems (subtitled A Security Life Cycle Approach) are shifting some focus areas within the MSP. The prior foundation for the program encompassed: policies, standards, and procedures; training and awareness; security architecture; and obtaining an authorization to operate. These continue, but within an emphasis on addressing the more dynamic aspects of risk management within the business to achieve a risk-based approach involving: total integration with the CMS Integrated IT Investment & System Life Cycle Framework (ILC), establishment and maintenance of common controls, and continuous monitoring of the security posture and risks of CMS systems. 4.1 RISK MANAGEMENT CMS views risk management as an enterprise-wide issue. There is one Authorizing Official for all CMS systems: the CIO. The CIO, Chief Technology Officer (CTO), and CISO perform the risk executive function jointly. The CMS Policy for the Information Security Program (PISP) sets the ground rules under which CMS shall operate and safeguard its information and information systems to reduce the risk, and minimize the effect of security incidents. The CMS Information Security Acceptable Risk Safeguards (ARS) Including CMS Minimum Security Requirements (CMSR) provides the minimum level of required security controls to protect CMS information and information systems to CMS and its contractors. Both of these documents are available at the CMS Information Security website library, located at COMMON CONTROLS CMS has established common controls. The CISO approves common controls and common control providers. The OCISO maintains the list, including all controls, control types (e.g., 12 June 25, Version 6.00 (FINAL)

19 CMS-CISO CMS Master Security Plan common, hybrid, system specific), common control provider, and scope of the control. Attachment 1 contains the list as of the date of this plan. For more information, or a current list please contact [email protected]. 4.3 CONTINUOUS MONITORING The OCISO oversees the continuous monitoring program. It has both manual and automated components, including system life cycle, IT governance, and security review and assessment processes and the soon to be implemented automated CMS FISMA Tracking System (CFACTS) and ncircle IP360 enterprise-monitoring tool. Please contact [email protected] for specific detailed information. 4.4 ENTERPRISE ARCHITECTURE The Technical Reference Architecture (TRA) provides the technical architecture approach and technical reference standards of CMS. TRA Supplements provide additional engineering detail allowing CMS contractors to build environments that adhere to both the approved CMS architecture as well as other CMS standards. Each architecture standard is reviewed and accepted as a foundational component of CMS Enterprise Architecture in accordance with CMS IT governance process. The TRA consists of the foundation TRA document and CMS TRA Supplements, authorized and approved by the CMS CTO. CMS CTO leads the development of the TRA with the support of all components of the Office of Information Services (OIS) and input from CMS IT contractors. The Agency maintains the Architecture according to its established Business Rules, as described in CMS TRA Business Rules Supplement. The foundation CMS TRA document and the CMS TRA Supplement documents, as well as their development and maintenance schedules, are managed by the CMS Enterprise Architecture and Strategy Group (EASG)/Division of IT Governance. Any changes to the TRA or its supplements must be approved by the CTO of the Agency. Any request for grant of special considerations should go to the CMS Technical Review Board (TRB). The CMS TRA Architecture Change Request Process Supplement, Version 1.0 describes the process for handling all requests for changes. June 25, Version 6.00 (FINAL) 13

20 CMS Master Security Plan Table 1 Attachment I s and Types CMS-CISO CMSR CMSR NAME Type of Common Provider AC-1 Access Policy and Scope of Common OIS/OCISO Enterprisewide AC-2 Account Management Hybrid AC-3 Access Enforcement Platform or service or Systemspecific AC-4 Information Flow Platform or service Enforcement or Systemspecific AC-5 Separation of Duties Hybrid AC-6 Least Privilege Hybrid AC-7 AC-8 AC-9 Unsuccessful Login Attempts System Use Notification Previous Logon (Access) Notification Platform or service or Systemspecific Platform or service or Systemspecific Platform or service or Systemspecific Hybrid AC-10 Concurrent Session AC-11 Session Lock Hybrid AC-14 Permitted Actions System-specific without Identification only or Authentication AC-17 Remote Access Hybrid AC-18 Wireless Access Common Baltimore campus AC-19 AC-20 AC-22 AT-1 Access for Mobile Devices Use of External Information Systems Publicly Accessible Content Security Awareness and Training Policy and Common CMS Owned Equip. Common OIS/OCISO CMS Employees Hybrid Common OIS/OCISO Enterprisewide AT-2 Security Awareness Hybrid OIS/OCISO Notes EDCG is managing wireless functionality 14 June 25, Version 6.00 (FINAL)

21 CMS-CISO CMS Master Security Plan CMSR CMSR NAME Type of Common Provider Scope of AT-3 Security Training Hybrid OIS/OCISO AT-4 Security Training Records Common OIS/OCISO CMS Employees AT-5 Contacts with Security Groups and Associations Common OIS/OCISO Enterprisewide AU-1 Audit and Accountability Policy and Common OIS/OCISO Enterprisewide AU-2 Auditable Events Hybrid AU-3 Content of Audit Hybrid Records AU-4 Audit Storage Hybrid Capacity AU-5 Response to Audit Hybrid Processing Failures AU-6 Audit Review, Analysis, and System-specific only Reporting AU-7 Audit Reduction and Report Generation System-specific only AU-8 Time Stamps Hybrid AU-9 Protection of Audit Information Platform or service or Systemspecific AU-10 Non-Repudiation Platform or service or Systemspecific AU-11 Audit Record Retention Platform or service or Systemspecific AU-12 Audit Generation Platform or service or Systemspecific CA-1 Security Assessment and Authorization Policies and Common OIS/OCISO Enterprisewide CA-2 Security Assessments Hybrid CA-3 Information System Connections Common Systems run CA-5 Plan of Action and Milestones (POA&M) System-specific only CA-6 Security Authorization System-specific only Notes June 25, Version 6.00 (FINAL) 15

22 CMS Master Security Plan CMS-CISO CMSR CMSR NAME Type of Common Provider CA-7 CM-1 Continuous Monitoring Configuration Management Policy and Hybrid Scope of Common OIS/OCISO Enterprisewide CM-2 Baseline Hybrid Configuration CM-3 Configuration Change Hybrid CM-4 Security Impact Hybrid Analysis CM-5 Access Restrictions Hybrid for Change CM-6 Configuration Hybrid Settings CM-7 Least Functionality Hybrid CM-8 Information System Component Inventory System-specific only CM-9 Configuration Hybrid Management Plan CP-1 Contingency Planning Policy and Common OIS/OCISO Enterprisewide CP-2 Contingency Plan Hybrid CP-3 Contingency Training Hybrid CP-4 Contingency Plan Hybrid Testing and Exercises CP-6 Alternate Storage Site Common Systems run CP-7 Alternate Processing Site Common Systems run CP-8 Telecommunications Services Common Systems run CP-9 Information System Backup Common Systems run CP-10 Information System Hybrid Recovery and Reconstitution IA-1 Identification and Authentication Policy and Common OIS/OCISO Enterprisewide IA-2 IA-3 Identification and Authentication (Organizational Users) Device Identification and Authentication Hybrid EUA Common Systems run IA-4 Identifier Hybrid IACS, EUA Notes 16 June 25, Version 6.00 (FINAL)

23 CMS-CISO CMS Master Security Plan CMSR CMSR NAME Type of Common Provider IA-5 IA-6 IA-7 IA-8 IR-1 Management Authenticator Management Authenticator Feedback Cryptographic Module Authentication Identification and Authentication (Non- Organizational Users) Incident Response Policy and Scope of Platform or service or Systemspecific Platform or service or Systemspecific Platform or service or Systemspecific Platform or service or Systemspecific Common OIS/OCISO Enterprisewide IR-2 Incident Response Training Common Systems run IR-3 Incident Response Testing and Exercises Common Systems run IR-4 Incident Handling Common Systems run IR-5 Incident Monitoring Common Systems run IR-6 Incident Reporting Common Systems run IR-7 Incident Response Assistance Common Systems run IR-8 MA-1 Incident Response Plan System Maintenance Policy and Version 5 CMSR additional Common Systems run Common OIS/OCISO Enterprisewide MA-2 led Maintenance Common Systems run MA-3 Maintenance Tools Hybrid MA-4 Non-Local Maintenance Common Systems run MA-5 Maintenance Personnel Common Systems run MA-6 Timely Maintenance Common Systems run MP-1 Media Protection Policy and Common OIS/OCISO Enterprisewide Notes June 25, Version 6.00 (FINAL) 17

24 CMS Master Security Plan CMS-CISO CMSR CMSR NAME Type of Common Provider Scope of MP-2 Media Access Common Systems run MP-3 Media Marking Common Systems run MP-4 Media Storage Common Systems run MP-5 Media Transport Hybrid MP-6 Media Sanitization Hybrid MP- CMS-1 Media Related Records Common Systems run PE-1 Physical and Environmental Protection Policy and Common OIS/OCISO Enterprisewide PE-2 Physical Access Hybrid OOM Authorizations PE-3 Physical Access Common OOM/SEMG CMS facilities PE-4 Access for Transmission Common OOM/SEMG CMS facilities Medium PE-5 Access for Hybrid OOM/SEMG Output Devices PE-6 Monitoring Physical Access Common OOM/SEMG CMS facilities PE-7 Visitor Common OOM/SEMG CMS facilities PE-8 Access Records Common OOM/SEMG CMS facilities PE-9 Power Equipment and Power Cabling Common OOM/SEMG CMS facilities PE-10 Emergency Shutoff Common OOM/SEMG CMS facilities PE-11 Emergency Power Common OOM/SEMG CMS facilities PE-12 Emergency Lighting Common OOM/SEMG CMS facilities PE-13 Fire Protection Common OOM/SEMG CMS facilities PE-14 Temperature and Humidity s Common OOM/SEMG CMS facilities PE-15 Water Damage Protection Common OOM/SEMG CMS facilities PE-16 Delivery and Removal Common OOM/SEMG Systems run PE-17 Alternate Work Site Hybrid OOM/SEMG PE-18 Location of Information System Components Common OOM/SEMG Systems run Notes 18 June 25, Version 6.00 (FINAL)

25 CMS-CISO CMS Master Security Plan CMSR CMSR NAME Type of Common Provider PL-1 PL-2 PL-4 Security Planning Policy and System Security Plan (SSP) Rules of Behavior (ROB) Scope of Common OIS/OCISO Enterprisewide System-specific only Common OIS/OCISO Enterprisewide PL-5 Privacy Impact Assessment (PIA) System-specific only PL-6 Security-Related Hybrid OIS/OCISO Activity Planning PS-1 Personnel Security Policy and Common OOM/SEMG CMS Employees PS-2 Position Categorization Common OOM/SEMG CMS Employees PS-3 Personnel Screening Common OOM/SEMG CMS Employees PS-4 Personnel Hybrid OOM/SEMG Termination PS-5 Personnel Transfer Hybrid OOM/SEMG PS-6 Access Agreements Hybrid OOM/SEMG PS-7 Third-Party Personnel Hybrid OOM/SEMG Security PS-8 Personnel Sanctions Common OOM CMS Employees RA-1 Risk Assessment Policy and Common OIS/OCISO Enterprisewide RA-2 Security Categorization System-specific only RA-3 Risk Assessment System-specific only RA-5 Vulnerability Scanning Common OIS/OCISO IT assets scanned by OIS/OCISO SA-1 System and Services Acquisition Policy and SA-2 Allocation of Resources System-specific only SA-3 Life Cycle Support System-specific only SA-4 Acquisitions System-specific only SA-5 Information System System-specific Common OIS/OCISO Enterprisewide Notes Spans servers, networks, & workstations June 25, Version 6.00 (FINAL) 19

26 CMS Master Security Plan CMS-CISO CMSR CMSR NAME Type of Common Provider SA-6 SA-7 Documentation Software Usage Restrictions User-Installed Software only Hybrid OIS/OCISO Scope of Common OIS/OCISO Enterprisewide SA-8 Security Engineering Principles System-specific only SA-9 External Information System Services Common OIS Systems run SA-10 Developer Hybrid OIS/OCISO Configuration Management SA-11 Developer Security Hybrid OIS/OCISO Testing SA-12 Supply Chain Protection System-specific only SA-13 Trustworthiness System-specific only SC-1 System and Communications Protection Policy and Common OIS/OCISO Enterprisewide SC-2 SC-3 SC-4 SC-5 Application Partitioning Security Function Isolation Information in Shared Resources Denial of Service Protection SC-7 Boundary Protection Platform or service or Systemspecific SC-8 SC-9 Transmission Integrity Transmission Confidentiality Platform or service or Systemspecific Platform or service or Systemspecific Common Systems run Platform or service or Systemspecific Platform or service or Systemspecific Platform or service or Systemspecific SC-10 Network Disconnect Platform or service or System- Notes Spans servers, networks, & workstations 20 June 25, Version 6.00 (FINAL)

27 CMS-CISO CMS Master Security Plan CMSR CMSR NAME Type of Common Provider SC-12 Cryptographic Key Establishment and Management SC-13 Use of Cryptography Platform or service or Systemspecific SC-14 Public Access Protections Scope of specific Common Systems run Platform or service or Systemspecific Hybrid SC-15 Collaborative Computing Devices SC-17 Public Key Infrastructure Certificates SC-18 Mobile Code Hybrid SC-19 Voice Over Internet Hybrid Protocol SC-20 Secure Name/Address Resolution Service (Authoritative Source) SC-21 SC-22 Secure Name/Address Resolution Service (Recursive or Caching Resolver) Architecture and Provisioning for Name/Address Resolution Service SC-23 Session Authenticity Platform or service or Systemspecific SC-24 Fail in Known State System-specific only SC-28 SC-32 SC- CMS-1 SC- CMS-2 SI-1 Protection of Information at Rest Information System Partitioning Electronic Mail Common Systems run Common Systems run Common Systems run Common Systems run Platform or service or Systemspecific Common Systems run Hybrid Persistent Cookies Inherited HHS System and Information Integrity Policy and Common OIS/OCISO Enterprisewide Notes Architecture driven June 25, Version 6.00 (FINAL) 21

28 CMS Master Security Plan CMS-CISO CMSR CMSR NAME Type of Common Provider Scope of SI-2 Flaw Remediation Hybrid SI-3 Malicious Code Common Systems run Protection SI-4 SI-5 SI-6 SI-7 Information System Monitoring Security Alerts, Advisories, and Directives Security Functionality Verification Software and Information Integrity Hybrid OIS/OCISO Common OIS/OCISO Enterprisewide Platform or service or Systemspecific Platform or service or Systemspecific SI-8 Spam Protection Inherited HHS CMS SI-9 Information Input Platform or service Restrictions or Systemspecific SI-10 Information Input Validation System-specific only SI-11 Error Handling System-specific only SI-12 Information Output Handling and Retention Hybrid OIS/OCISO Notes Spans servers, networks, & workstations participating in the vulnerability management program. 22 June 25, Version 6.00 (FINAL)

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007

More information

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health

More information

REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013

REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Department of Health and Human Services OFFICE OF INSPECTOR GENERAL REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Inquiries about this report may be addressed

More information

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element) FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide

More information

HHS Information System Security Controls Catalog V 1.0

HHS Information System Security Controls Catalog V 1.0 Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security

More information

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP

More information

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2. VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

CONTINUOUS MONITORING

CONTINUOUS MONITORING CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how

More information

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY

More information

Security Self-Assessment Tool

Security Self-Assessment Tool Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security

More information

Industrial Security Field Operations

Industrial Security Field Operations Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping

More information

Security Controls Assessment for Federal Information Systems

Security Controls Assessment for Federal Information Systems Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

More information

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY

More information

System Security Certification and Accreditation (C&A) Framework

System Security Certification and Accreditation (C&A) Framework System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

FISMA: Securing National Infrastructure

FISMA: Securing National Infrastructure FISMA: Securing National Infrastructure Using a Holistic Approach to Lower Total Cost of Ownership (TCO) of FISMA Compliance by 50% or More an eiqnetworks White Paper by John Linkous Security and Compliance

More information

Minimum Security Requirements for Federal Information and Information Systems

Minimum Security Requirements for Federal Information and Information Systems FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory

More information

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act. OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr Action AU-3/ AU3(1) AU-3 CONTENT OF AUDIT RECORDS

More information

Security Control Standards Catalog

Security Control Standards Catalog Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...

More information

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002

More information

Minimum Acceptable Risk Standards for Exchanges Exchange Reference Architecture Supplement

Minimum Acceptable Risk Standards for Exchanges Exchange Reference Architecture Supplement Minimum Acceptable Risk Standards for Exchanges Exchange Reference Architecture Supplement Executive Overview The Patient Protection and Affordable Care Act of 2010 1 (hereafter simply the Affordable Care

More information

BPA Policy 434-1 Cyber Security Program

BPA Policy 434-1 Cyber Security Program B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy

More information

Publication 4812. Contractor Security Controls

Publication 4812. Contractor Security Controls Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** July 2014 Highlights of Publication 4812

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY. HUD Handbook 2400.25 REV4.1

U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY. HUD Handbook 2400.25 REV4.1 U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY HUD Handbook 2400.25 REV4.1 March 2016 Document Change History Version Number Date Description Author 2.0 November

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

NASA OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA

More information

Publication 4812. Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites***

Publication 4812. Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** Information Technology CYBERSECURITY Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** Publicationn

More information

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Compliance Review Analysis and Summary of Results HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Security Compliance In a Post-ACA World

Security Compliance In a Post-ACA World 1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further

More information

INFORMATION TECHNOLOGY POLICY

INFORMATION TECHNOLOGY POLICY COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013

More information

DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency

DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency thereof, nor any employee, makes any warranty, expressed

More information

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12 Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

FINAL Version 2.0 September 20, 2013

FINAL Version 2.0 September 20, 2013 CENTERS for MEDICARE & MEDICAID SERVICES Enterprise Information Security Group 7500 Security Boulevard Baltimore, Maryland 21244-1850 Standard: CMS Information Security, CMS Minimum Security Requirements

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

Requirements For Computer Security

Requirements For Computer Security Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing

More information

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive

More information

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This

More information

CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments

CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments January 9, 2008

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Written Information Security Program (WISP)

Written Information Security Program (WISP) Your Logo Will Be Placed Here Written Information Security Program (WISP) ACME Consulting, LLC Copyright 2014 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE

More information

THE FRAUD PREVENTION SYSTEM IDENTIFIED MILLIONS IN MEDICARE SAVINGS, BUT THE DEPARTMENT COULD STRENGTHEN SAVINGS DATA

THE FRAUD PREVENTION SYSTEM IDENTIFIED MILLIONS IN MEDICARE SAVINGS, BUT THE DEPARTMENT COULD STRENGTHEN SAVINGS DATA Department of Health and Human Services OFFICE OF INSPECTOR GENERAL THE FRAUD PREVENTION SYSTEM IDENTIFIED MILLIONS IN MEDICARE SAVINGS, BUT THE DEPARTMENT COULD STRENGTHEN SAVINGS DATA BY IMPROVING ITS

More information

Review of the SEC s Systems Certification and Accreditation Process

Review of the SEC s Systems Certification and Accreditation Process Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy

More information

Deriving Software Security Measures from Information Security Standards of Practice

Deriving Software Security Measures from Information Security Standards of Practice Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material

More information

FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards NIST CONTROL CLOUDCHECKR SUPPORT ACTIVITY AC-2 ACCOUNT MANAGEMENT Control: The organization: a. Identifies and selects the following

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.

More information

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Joan Hash, Pauline Bowen, Arnold Johnson, Carla

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

Bellingham Control System Cyber Security Case Study

Bellingham Control System Cyber Security Case Study Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Appendix A CMSR High Impact Level Data

Appendix A CMSR High Impact Level Data Office of Information Services Centers for Medicare & Medicaid Services 7500 Security Boulevard Baltimore, Maryland 21244-1850 Appendix A CMSR High Impact Level Data FINAL Version 2.0 September 20, 2013

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

2012 FISMA Executive Summary Report

2012 FISMA Executive Summary Report 2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief

More information

Final Audit Report -- CAUTION --

Final Audit Report -- CAUTION -- U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management

More information

General HIPAA Implementation FAQ

General HIPAA Implementation FAQ General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,

More information

A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls*

A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls* !!!!!!!!!!!!! A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls* Technical Report: UNO-TGRS-20131121-1 Robin Gandhi, Harvey Siy, Sayonnha Mandal The University of Nebraska

More information

2014 Audit of the Board s Information Security Program

2014 Audit of the Board s Information Security Program O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL

More information

CMS INFORMATION SECURITY ASSESSMENT PROCEDURE

CMS INFORMATION SECURITY ASSESSMENT PROCEDURE Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS INFORMATION SECURITY ASSESSMENT PROCEDURE March 19, 2009 Version 2.0- Final Summary of Changes in CMS

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10 HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

Privacy Impact Assessment

Privacy Impact Assessment For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 [email protected] System Owner: Keith

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Information Security and Privacy Policy Handbook

Information Security and Privacy Policy Handbook Information Security and Privacy Policy Handbook This document implements OPM s Information Security and Privacy Policy requirements for the protection of information and information systems. Chief Information

More information