UNCLASSIFIED. Rules of Behavior Department of State SharePoint System (DOSSS) Internet DMZ
|
|
|
- Georgia Reed
- 10 years ago
- Views:
Transcription
1 Rules of Behavior Department of State SharePoint System (DOSSS) Internet DMZ Version 1.0 January 30, 2012 Prepared By: Systems & Integration Office (SIO) IRM/OPS/SIO/CCS
2 Author: Distribution: Document Location: E. Foreman This document is for U.S. Department of State, IRM/OPS/SIO/CCS Internal Use Only. The master copy of this document resides at: \\siomossmgt01\ecs-share\master Documents\Agreements\DMZ Rules of Behavior.docx Document History Date Version Sections/Pages Affected Comments 02/25/ All Initial Draft 04/19/ All Draft 2 06/29/ All Clarifying roles, removing PII info 10/06/ All Adding in info from Privacy group re: PII 01/30/ All Final review January 30, 2012 i Version 2.0
3 Table of Contents SECTION 1.0 INTRODUCTION... 1 SECTION 2.0 SHAREPOINT OVERVIEW... 1 SECTION 3.0 USER ACCESS... 2 SECTION 4.0 DATA CLASSIFICATION AND SECURITY... 3 SECTION 5.0 USER PERMISSIONS... 4 SECTION 6.0 SHAREPOINT RULES OF BEHAVIOR... 5 SECTION 7.0 NON-ACCEPTABLE USE LOW DMZ... 6 SECTION 8.0 USE OF PII MODERATE DMZ... 7 SECTION 9.0 OTHER POLICIES AND PROCEDURES... 7 APPENDIX A. GLOSSARY... 9 January 30, 2012 ii Version 2.0
4 Section 1.0 Introduction The Office of Management and Budget (OMB) Circular A-130, Appendix III Security of Federal Automated Information Resources requires that Rules of Behavior be established for each general support information technology system and major application processing government information. The Rules of Behavior delineated below pertain to all persons who utilize the Department of State SharePoint (DOSSS) web portal, which is an IT resource for the Department of State (DoS). The following Rules of Behavior and acceptable use policy apply to all administrators and contributors in the DOSSS environment whether they are DoS employees, contractors, or members of external agencies. The Rules of Behavior provide general instructions on the appropriate use of the DOSSS and specifically apply to SharePoint sites and their respective sub-sites in the Internet Demilitarized Zone (DMZ) 1. Section 2.0 SharePoint Overview SharePoint allows you to: Store your organization s documents and information securely Collaborate on documents and reports Manage content and streamline processes Build a collaboration and published website for information sharing and or marketing purposes Search for documents and sites 1 DOSSS in the Internet DMZ is referred to internally as DOSSS-I. January 30, Version 1.0
5 Section 3.0 User Access 3.1 Upon initial login to Internet DMZ, users will be required to change their initial assigned passwords to new, unique passwords. Users will be required to change their passwords every 180 days thereafter. This policy is subject to change per the requirements of the Active Directory team. 3.2 The Internet DMZ Administrator will be responsible for verifying and creating accounts for site users. 3.3 The Internet DMZ Administrator will be responsible for reviewing all user accounts to determine whether the accounts and/or levels of access granted by the accounts are still required User accounts will be disabled when the following events occur: The user requests account termination A discretionary termination request is received from the DoS Authorized POC A discretionary termination request is received from the Internet DMZ Administrator The account has been abandoned (i.e., the account is inactive for more than 180 days) The user separates from their Requesting User s Organization (RUO) (subject to confirmation) The user violates the DOSSS Rules of Behavior for the Internet DMZ The Requesting User s Organization (RUO) POC must inform SIO immediately when a user no longer needs their account due to change of duties, transfer, separation, or other cause The request to terminate the account must be submitted to the ITSC by the Internet DMZ Administrator along with the user s username, full name and address and the contact information for the DoS Authorized POC and Internet DMZ Administrator Upon receipt of the account termination request from the Internet DMZ Administrator, the SIO representative will delete (not disable) the user s account from the APP domain January 30, Version 1.0
6 Active Directory. ITSC will send an account termination notification to the Internet DMZ Administrator and DoS Authorized POC once the account has been deleted. Section 4.0 Data Classification and Security 4.1 All Internet DMZ users have an obligation to safeguard information with national security and/or privacy implications. 4.2 Internet DMZ sites residing on or accessible via the Internet DMZ network are for the processing of Unclassified data only. 4.3 Each DoS page will display an appropriate classification banner informing the user of the page s security classification as determined by the System Categorization Form by Information Assurance (IA). Internet DMZ users will take note of the classification and treat the data on the page accordingly. 4.4 The Administrator will periodically review the site to ensure that no data higher than the approved classification level is posted. 4.5 The Administrator will ensure that Contributors are familiar with these data classification and security rules of behavior and that every effort is made to prevent data spillage. 4.6 If an Internet DMZ user observes content that is a higher classification level than approved, they must immediately report this infraction to the Administrator The Administrator receiving the report will immediately remove the prohibited content from the affected site The Administrator will then report the infraction to their ISSO, who will instruct the ITSC on how to proceed. The Administrator will also notify SIO via Remedy ticket. The standard response will be to remove any prohibited content from all site back-ups and locations as needed. January 30, Version 1.0
7 Section 5.0 User Permissions 5.1 All SharePoint users within the DMZ are assigned a permission level that provides them access privileges and functional capabilities appropriate to their business functions. In general, users are granted the lowest permission level necessary for them to carry out their jobs. These permission levels form the basis for creating custom user groups. The following SharePoint site permission levels will be available to Internet DMZ users: Readers (General Users) A Reader of a site has the ability to read items and content to which they have read access. A Reader is designated a Reader of the site by the Site Administrator. Contributors (Users) A Contributor is an individual who adds (posts), deletes, and edits content on a collaboration site. An individual is assigned Contributor permissions by the Site Administrator, based on a business need to exercise Contributor permissions on the site. Contributor permissions are granted only after the individual has read and agreed to the MOSS Rules of Behavior for the network on which their site resides. Designers (Power Users) Designers plan the site s physical layout and information architecture, perform updates and customizations to the site, and generally monitor and maintain its validity and usability. Site Administrators (Full Control) Site Administrators are responsible for performing the software procedures that govern the configuration of the site interface and users access to the site. Site Administrators also ensure that site participants can use the site by providing training, complying with usability and accessibility standards, etc. As a best practice, at least two Site Administrators manage each SharePoint site and its sub sites to ensure proper management and control of administrative functions. 5.2 Only cleared DOS users are eligible to be Site Administrators and they must meet all SCA requirements Only cleared US Government users (example:.mil or.gov addresses) are eligible for Designer permissions on Unclassified sites Cleared non-dos users are eligible for Contributor or Reader permissions Only cleared, authorized DoS administrative users will be able to access Internet DMZ administrative functions, application back ends, or databases from the DMZ. January 30, Version 1.0
8 5.2.4 All permission groups must be assigned. Under no circumstances should all authenticated users be able to access all information. 5.3 Only users provided with access to specific content (e.g., lists, individual files) will be able to view them. The existence of content, data, and applications will be hidden from other SharePoint users not authorized to see them. 5.4 Internet DMZ Administrator will be responsible for defining granular levels of site access based on who a user is, the groups to which the user belongs, and the degree to which that user is compliant with corporate governance policy. 5.5 The Internet DMZ Administrator will be responsible for managing permissions on their sites. The Access Request function must be enabled at the Site level. This ensures that users who wish to access the site, sub-sites, or specific content items will have someone follow-up with them and either grant or deny them rights to the site. Section 6.0 SharePoint Rules of Behavior 6.1 The Rules of Behavior are suggested guidelines and best practices for using SharePoint in the DOS environment regardless of the site classification level. 6.2 New Internet site requests require approval of the site s system categorization by the Bureau of Information Assurance (IA). The SharePoint Internet site collection content level will be determined by the categorization level determined by IA. Prior to requesting an Internet site, users must complete a Systems Categorization Form (SCF) and e-authorization Form. 6.3 Site Administrators, Designers, and Contributors must follow a configuration management process for storing information and data on SharePoint sites. 6.4 Site Administrators are responsible for the management of site content at the top-level site and at the sub-site levels. Sub-sites must meet the same DoS access and data security standards as higher-level sites. Site Administrators may re-assign the responsibility of Content Manager to those individuals who manage particular sub-sites. 6.5 Users who violate the Rules of Behavior must be reported to their local ISSO. January 30, Version 1.0
9 Section 7.0 Non-Acceptable Use Low DMZ This policy identifies actions that should not be performed with SharePoint on the Low Internet DMZ. 7.1 It is strictly prohibited to post, review, process, or modify any content above the appropriate content categorization level, any content containing information above the accreditation level, must be recertified by IA. 7.2 Users cannot post combinations of key privacy information or combinations of Personally Identifiable Information (PII) on the Low Internet (DMZ) These combinations could include but are not limited to full name, birth date, social security number, address, and DoS employees personnel records Examples of personnel records include compensation, rewards, reviews, or appraisals. 7.3 Users should not post items that will affect the National Security of the Department of State or any collaborating agencies Examples of non-acceptable information include: Social Security Number + Last Name (or any combination of SSN with other PII, i.e. date of birth, phone number, and first name) Communications, contracts, or negotiations regarding external affairs Architectural drawings or floor plans related to DoS facility (embassies, consulates, posts, etc.) 7.4 SharePoint should not be used to post inappropriate documentation, announcements, lists, etc. that could be considered offensive by other site participants. 7.5 Under no circumstances will more than one user be assigned or permitted to use the same user ID and password. Group user IDs and passwords are prohibited. 7.6 Internet DMZ user accounts/login credentials may not be transferred from one user to another. January 30, Version 1.0
10 7.7 The RUO may not request or maintain permanent Internet DMZ user accounts for visitors, vendor service personnel, training, demonstrations, or other purposes. 7.8 Internet DMZ users may not use personal, non-government accounts associated with user account (e.g., Gmail, Yahoo, other service provider accounts) to communicate with the Internet DMZ website. Only valid U.S. Government-issued accounts will be recognized (e.g.,.gov,.mil, etc.). Section 8.0 Use of PII Moderate DMZ Rules of behavior regarding the use of PII on the Moderate DMZ are not intended to replace existing policies or guidelines. Rather, they are intended to supplement the present document (DOSSS Rules of Behavior for Internet DMZ). The Moderate DMZ will also comply with the SIO SharePoint User Governance Model and Standards, which define the regulations governing the Department of State s SharePoint deployment and usage centrally and regionally. Moderate sites must be approved at the moderate categorization level. 8.1 Users can post combinations of key privacy information or combinations of Personally Identifiable Information (PII) on the Moderate Internet (DMZ) when deemed necessary If Personally Identifiable Information (PII) needs to be posted on DMZ please consult the Privacy Division, at [email protected], for appropriate guidance on your particular need to collect, maintain, and use PII on your site. Such consultation may include the need to conduct a privacy impact assessment in accordance with the E-Government Act of These combinations could include full name, birth date, social security number, address, and DoS employees personnel records. Examples of personnel records include compensation, rewards, reviews, or appraisals. Section 9.0 Other Policies and Procedures The Rules of Behavior are not to be used in place of existing policy or guidelines. Rather, they are intended to supplement the DoS Information Security Program Policy and the DoS January 30, Version 1.0
11 Information Security Program Handbook. Because written guidance cannot cover every contingency, Department staff are asked to augment these rules and use their best judgment and highest ethical standards to guide their actions. As with any DoS website, users must adhere to the following guidelines: 5FAH-8 H-100, 5FAH- 8 H-200, 5FAH-8 H-400, 5FAH-8 H-430, 5FAH-8 H450, 5FAM-770, and 5FAM-790. Additionally, for Internet-hosted sites, users must adhere to the Department s guidelines on the clearance and dissemination of information intended for the public, which are provided in 3FAM-4170 and 10FAM-120. The referenced FAM and FAH documents are available to Internet users at January 30, Version 1.0
12 Appendix A. Glossary DMZ De-Militarized Zone. A physical or logical subnetwork that contains and exposes an organization s external services to a larger untrusted network, usually the Internet. A DMZ adds an additional layer of security to an organization s Local Area Network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. DOSSS Department of State SharePoint. The Department s implementation of Microsoft Office SharePoint (MOSS) IA Bureau of Information Assurance. Internet DMZ Administrators - Administrative authority, responsible for approving and creating central accounts and having full control for all sites and subsites in the Internet DMZ. IT Service Center (ITSC) Manages Universal Trouble Tickets (UTT) and/or Remedy. The ITSC will be the first line of support for all SharePoint related issues. Requesting User s Organization (RUO) Organization sponsoring non-dos personnel as Internet DMZ users; e.g., the U.S. Department of Defense. Sensitive But Unclassified (SBU) A designation of information in the United States Federal Government that, though unclassified, often requires strict controls over its distribution. Site Collection Administrators (SCAs) DOSSS users with highest Administrative authority, responsible for approving and creating central accounts and having full control for all sites and subsites. January 30, Version 1.0
Department of State SharePoint Server PIA
1. Contact Information A/GIS/IPS Director Department of State SharePoint Server PIA Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS
5 FAM 870 NETWORKS (Office of Origin: IRM/BMP/GRP/GP) 5 FAM 871 ENTERPRISE NETWORKS (CT:IM-138; 01-18-2013) The Department currently has two enterprise networks: ClassNet and OpenNet. Only Department-issued
5 FAM 790 USING SOCIAL MEDIA
5 FAM 791 SCOPE 5 FAM 790 USING SOCIAL MEDIA (Office of Origin: IRM/BMP/GRP) a. Social media consist of a variety of digital technologies that foster interaction among individuals who use the tools. Social
Department of the Interior Privacy Impact Assessment
Department of the Interior August 15, 2014 Name of Project: email Enterprise Records and Document Management System (eerdms) Bureau: Office of the Secretary Project s Unique ID: Not Applicable A. CONTACT
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Information Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Privacy Impact Assessment for the. E-Verify Self Check. March 4, 2011
for the E-Verify Self Check March 4, 2011 Contact Point Janice M. Jackson Privacy Branch, Verification Division United States Citizenship and Immigration Services 202-443-0109 Reviewing Official Mary Ellen
Secondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
Privacy Impact Assessment for the. E-Verify Self Check. DHS/USCIS/PIA-030(b) September 06, 2013
for the E-Verify Self Check DHS/USCIS/PIA-030(b) September 06, 2013 Contact Point Donald K. Hawkins Privacy Officer United States Citizenship and Immigration Services (202) 272-8030 Reviewing Official
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Information Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
Appendix H: End User Rules of Behavior
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION
Crew Member Self Defense Training (CMSDT) Program
for the Crew Member Self Defense Training (CMSDT) Program February 6, 2008 Contact Point Michael Rigney Federal Air Marshal Service Flight Programs Division [email protected] Reviewing Officials Peter
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh
SYSTEM OF RECORDS NO.: OCIO/QN.01 SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281 SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh Street, SW, Washington
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
Privacy Impact Assessment for the. Remedy System. November 15, 2006. Contact Point Luis Vega, 202-648-9411
Privacy Impact Assessment for the Remedy System November 15, 2006 Contact Point Luis Vega, 202-648-9411 Chief, Operations Performance Management Section Information Services Division (ISD) Office of Science
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
Verizon Notification Service (VNS)
ADAMS ML12067A167 U.S. Nuclear Regulatory Commission Revised Privacy Impact Assessment Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012
for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program [email protected] Reviewing Official Mary
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
In Brief. Smithsonian Institution Office of the Inspector General. Smithsonian Institution Information Security Program
Smithsonian Institution Office of the Inspector General Smithsonian Institution In Brief Report Number A-11-05, May 15, 2012 Why We Did This Audit The Federal Information Security Management Act of 2002
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
OSAC Committees are as follows: Threats and Information Sharing; Country Council and Outreach; and Security Awareness and Innovation.
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Aurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the Northrop
Privacy Impact Assessment
Technology, Planning, Architecture, & E-Government Version: 1.1 Date: April 14, 2011 Prepared for: USDA OCIO TPA&E Privacy Impact Assessment for the April 14, 2011 Contact Point Charles McClam Deputy Chief
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
8070.S000 Application Security
8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Federal Trade Commission Privacy Impact Assessment. for the: Analytics Consulting LLC Claims Management System and Online Claim Submission Website
Federal Trade Commission Privacy Impact Assessment for the: Analytics Consulting LLC Claims Management System and Online Claim Submission Website January 2015 Page 1 of 14 1 System Overview The Federal
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
REMEDY Enterprise Services Management System
for the Enterprise Services Management System April 28, 2016 Contact Point Marshall Nolan Border Enforcement and Management Systems Division Office of Information Technology U.S. Customs & Border Protection
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
DHS SharePoint and Collaboration Sites
for the March 22, 2011 Robert Morningstar Information Systems Security Manager DHS Office of the Chief Information Officer/Enterprise Service Delivery Office (202) 447-0467 Reviewing Official Mary Ellen
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
Standard Operating Procedure Information Security Compliance Requirements under the cabig Program
Page 1 of 9 Pages Standard Operating Procedure Information Security Compliance Requirements under the cabig Program This cover sheet controls the layout and components of the entire document. Issued Date:
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments January 9, 2008
5 FAH-8 H-351 CLOUD COMPUTING
5 FAH-8 H-350 CLOUD COMPUTING (Office of Origin: IRM/BMP) 5 FAH-8 H-351 CLOUD COMPUTING GOVERNANCE BOARD a. The Cloud Computing Governance Board (CCGB) exists to provide advice to the Authorizing Official
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Federal Bureau of Prisons. Privacy Impact Assessment for the HR Automation System. Issued by: Sonya D. Thompson Deputy Assistant Director/CIO
Federal Bureau of Prisons Privacy Impact Assessment for the HR Automation System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Eric Olson, Acting Chief Information
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
How To Understand The System'S Purpose And Function
NOTE: The following reflects the information entered in the PIAMS Website. A. SYSTEM DESCRIPTION Authority: Office of Management Budget (OMB) Memorandum (M) 03-22, OMB Guidance for Implementing the Privacy
SMSe Privacy Impact Assessment
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
Attachment F. Incident Response
DHS 4300A Sensitive Systems Handbook Attachment F To Handbook v. 11.0 Incident Response Version 11.0 April 24, 2015 Protecting the Information that Secures the Homeland This page intentionally blank v11.0,
ManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
Computer and Network Security Policy
Coffeyville Community College Computer and Network Security Policy Created By: Jeremy Robertson Network Administrator Created on: 6/15/2012 Computer and Network Security Page 1 Introduction: The Coffeyville
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
This Instruction implements Department of Homeland Security (DHS) Directive 110-01, Privacy Policy for Operational Use of Social Media.
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 110-01-001 Revision Number: 00 Issue Date: 6/8/2012 PRIVACY POLICY FOR OPERATIONAL USE OF SOCIAL MEDIA This Instruction
DEPARTMENT OF STATE FISCAL YEAR 2008 PRIVACY IMPACT ASSESSMENT
DEPARTMENT OF STATE FISCAL YEAR 2008 PRIVACY IMPACT ASSESSMENT Security Management System-enterprise (SMSe) Conducted by: Bureau of Administration Information sharing and Services Office of Information
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
eopf Release E Administrator Training Manual
eopf Release E Administrator Training Manual i The United States Office Of Personnel Management eopf Administrator Training Manual for eopf v5 eopf Version 4.1, July 2007, March 2008, March 2009; eopf
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
