Plan of Action and Milestones (POA&M) Training Session
|
|
|
- Branden Pearson
- 10 years ago
- Views:
Transcription
1 Plan of Action and Milestones (POA&M) Training Session Jamie Nicholson IM-31, Policy, Guidance, & Planning Division U.S. Department of Energy Office of the Associate CIO for Cyber Security 1
2 Objectives Provide guidance for developing effective POA&Ms. Discuss partnership role of the OCIO. Improve understanding of the difference between program and system level POA&M. Review exercise that demonstrates the possible types of POA&Ms, as well as review documentation requirements. Provide open forum for discussion. 2
3 What is a POA&M? Plan of Actions and Milestones A POA&M is a management tool for tracking the mitigation of cyber security program and system level findings/weaknesses. 3
4 Sources of POA&Ms Where do POA&Ms come from? External findings (e.g., HSS, IG, GAO, Site Office reviews, etc.) Internal findings (e.g., In-house self-assessments, peer reviews, etc.) Certification & Accreditation (C&A) Activities (e.g., Failed certification tests, etc.) 4
5 What is not a POA&M? A POA&M is not an Action Tracking Plan. A POA&M is not a Corrective Action Plan, or CAP. CAP provides specific information as to remediation of findings/weaknesses. CAP includes a determination of causal factors and trends. 5
6 Corrective Action Plan, or CAP CAPs are required for all POA&Ms with corrective actions that require more than one (1) year to complete. At a minimum, CAPS must include: Root cause analysis Mitigation/resolution alternatives and associated risk analyses Recurrence prevention strategies CAPs for findings identified by HSS must comply with guidance established/directed by that organization. DOE O 470.2B, Independent Oversight and Performance Assurance Program 6
7 Drivers FISMA, Title III, Information Security OMB M-02-01, Guidance for Preparing and Submitting Security Plans of Action and Milestones DOE 205.1A, Department of Energy Cyber Security Management DOE M , Cyber Security Process Requirements Manual Senior DOE Management PCSPs 7
8 Business Purpose Effective Data Analysis Consistent, aggregated information is an effective management tool. Showcase systematic successes and problems. Snapshot of program and system level status. Assists with timely resolution of findings and prioritization of resources. Enhance C&A efforts. POA&M information impacts internal and congressional scorecards. OMB requires Federal agencies to report all system and program deficiency information quarterly. 8
9 Partnership OCIO is a partner in the POA&M process. We view our office as a resource to assist with issues or questions. We are open to suggestions. You are welcome to contact the OCIO directly if you have suggestions or questions, but please coordinate communications with your POC. You can benefit from information that we have learned as a result of partnering with other organizations internal and external to DOE. 9
10 Baseline Requirements A POA&M must be developed for each program and system level finding/weakness as identified by: Office of Health, Safety, and Security (HSS) General Accounting Office (GAO) Office of Inspector General (IG) Internal program and system reviews/selfassessments C&A Activities 10
11 Baseline Requirements Each POA&M and its associated milestone(s) must have a scheduled completion date that reflects a reasonable time period for completion of a remediation activity. Findings/weaknesses identified by the GAO and IG are generally expected to be completed within 1 year. Reference DOE O 224.3, Audit Resolution and Follow-up Program. Per OMB, changes cannot be made to the original description of the finding/weakness, milestones, scheduled completion dates, or source. Exception to the rule does exist. Reported closure of the finding/weakness and/or milestones must be validated by independent party not the individual(s) directly responsible for the closure. 11
12 Baseline Requirements The following information must be reported on the POA&M when a finding/weakness and/or milestone is completed: Name and title of individual performing verification Date of verification All completed milestones must be verified by an independent before weakness closure. All completed findings/weaknesses must remain on POA&M report for a period of 1 year from the date of verification. 12
13 Exception to the Rule Changes cannot be made to original POA&M content unless: Changes are fully supported by documentation as required by the originating source (i.e., internal or external) of the finding/weakness. Changes must be coordinated with your specific Data Call POC. Detail of any changes must be noted in Comment column. 13
14 Program vs. System Level Program Level POA&M A program level finding/weakness addresses identified cyber security weaknesses or deficiencies that impact the entire cyber security program. For example, Lack of effective password policy across all platforms. Lack of formalized risk assessment process. Lack of approved PCSP 14
15 Program vs. System Level System Level POA&M A system level finding/weakness addresses an identified weakness associated with an information system with a defined accreditation boundary or a single System Security Plan (SSP). For example, System X does not comply with stated password characteristic requirements. No formal risk assessment documentation exists for System X. System X does not have a required contingency plan 15
16 Answers to Common Questions POA&Ms are required for findings/weaknesses associated with unclassified and classified systems operated by DOE or DOE contractors. System level and program level findings/weaknesses must be documented and divided into two (2) separate templates. All applicable cells in the POA&M template for findings/ weaknesses must be completed. All findings/weaknesses must be associated with at least one milestone. 16
17 Answers to Common Questions All findings/weaknesses and milestones must have a Scheduled Completion Date; TBD is not acceptable. Utilize comment field if there is additional information concerning the completion date. The Scheduled Completion Date must provide adequate time for verification activities. Columns on the standard POA&M template cannot be changed or deleted. 17
18 Answers to Common Questions Organization can add columns to the RIGHT of the standard template. All POA&M data call submissions are to be considered OUO and must be encrypted. Do not send POA&M data call responses to Cyber Security Mailbox. If the organization does not have any program or system level POA&Ms, then report this status as directed. Cyber Security Reporting Dates: 8/01/XXXX 10/31/XXXX 11/01/XXXX 1/31/XXXX 2/1/XXXX 4/30/XXXX 5/1/XXXX 7/31/XXXX 18
19 Answers to Common Questions POA&M information must be consistent with information submitted in quarterly Cyber Security Internal Report Cards and Information Security (Metrics) Data Calls. Examples include: Number of findings/weaknesses reported on the Report Card must be consistent with the number of findings/weaknesses reported on the POA&M. Number of operational systems needing C&A and/or certification testing as reported on the Information Security data call must be represented by one or more POA&Ms. Number of findings/weaknesses over 90 days as reported on the Information Security data call must be consistent with POA&M information. Number of findings/weaknesses not completed as scheduled and reported on the Report Card must be consistent with POA&M information. 19
20 POA&Ms for Classified Findings/ Weaknesses Do not submit POA&Ms with classified information. Do not document the system name, finding/weakness description, weakness category, or milestone descriptions. See Report must be entered in these fields. Do notate the following information: Classification Level Identified Source Audit Report Number Exhibit 300 or 53 information Site Location and POC Name Resources Required Milestone Number Scheduled and Actual Completion Dates 20
21 Hands-On Exercise Program Review/Self Assessment Assessment Objective: Determine if 100% of remote access connections that access SUI/PII utilize 2-factor authentication where one of the factors is provided by a physical device separate from the computer gaining access. Assessment Method: Interview and Examine. Expected Outcome: All remote connections (100%) accessing SUI/PII must successfully authenticate to the system using 2-factor authentication before access to such information is granted. Actual Result: Only 45% of remote connections accessing SUI/PII are using 2-factor authentication. Evaluation: Fail. 21
22 Questions? Jamie Nicholson Or Danica Wheelock
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
CYBER SECURITY PROCESS REQUIREMENTS MANUAL
MANUAL DOE M 205.1-5 Approved: Admin Chg 1: 9-1-09 Admin Chg 2: 12-22-09 CYBER SECURITY PROCESS REQUIREMENTS MANUAL U.S. DEPARTMENT OF ENERGY Office of the Chief Information Officer AVAILABLE ONLINE AT:
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
OFFICE OF INDEPENDENT OVERSIGHT OFFICE OF CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE
OFFICE OF INDEPENDENT OVERSIGHT OFFICE OF CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Preface Preface Department of Energy
Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY 2012. Report No. 4A-CI-00-12-016
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY 2012 Report No. 4A-CI-00-12-016 Date:
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report. Security Over Wireless Networking Technologies
U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report Security Over Wireless Networking Technologies DOE/IG-0617 August 2003 Department of Energy Washington, DC 20585
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
2014 Audit of the Board s Information Security Program
O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
Evaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,
United States Department of Agriculture. Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
DOE O 226.1A, IMPLEMENTATION OF DEPARTMENT OF ENERGY OVERSIGHT POLICY CONTRACTOR ASSURANCE SYSTEMS CRITERIA ATTACHMENT 1, APPENDIX A
DOE O 226.1A, IMPLEMENTATION OF DEPARTMENT OF ENERGY OVERSIGHT POLICY CONTRACTOR ASSURANCE SYSTEMS CRITERIA ATTACHMENT 1, APPENDIX A DEFINITIONS Assurance systems encompass all aspects of the processes
Briefing Report: Improvements Needed in EPA s Information Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Briefing Report: Improvements Needed in EPA s Information Security Program Report No. 13-P-0257 May 13, 2013 Scan this mobile code to learn
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
Evaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 November 13, 2015 OIG-16-08 DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 November 13, 2015
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 205.1A SUBJECT: DEPARTMENT OF ENERGY CYBER SECURITY MANAGEMENT Approved: 1. PURPOSE. The Department of Energy s (DOE s) overarching mission to advance
EPA Classification No.: CIO-2150.3-P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM SECURITY ASSESSMENT AND AUTHORIZATION PROCEDURES V2 JULY 16, 2012 1. PURPOSE The
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES
STATEMENT OF MARK A. FORMAN ASSOCIATE DIRECTOR FOR INFORMATION TECHNOLOGY AND ELECTRONIC GOVERNMENT OFFICE OF MANAGEMENT AND BUDGET BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
Department of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Audit Report. Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon
U.S. Department of Agriculture Office of Inspector General Western Region Audit Report Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland,
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 22, 20 14
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL INFORMATION TECHNOLOGY AUDIT DIVISION September 22, 20 14 FINAL MANAGEMENT INFORMATION REPORT To: From: Subject: James W. Runcie ChiefOperating
Office of Inspector General
Evaluation Report OIG-CA-14-006 INFORMATION TECHNOLOGY: The Department of the Treasury Federal Information Security Management Act Fiscal Year 2013 Evaluation vember 25, 2013 Office of Inspector General
Office of the Assistant Secretary for Administration and Management Washington, D.C. 20210. ELLIOT P. LEWIS Assistant Inspector General for Audit
U.S. Department of Labor Office of the Assistant Secretary for Administration and Management Washington, D.C. 20210 AUG 1 4 2015 MEMORANDUM FOR: FROM: SUBJECT: ELLIOT P. LEWIS Assistant Inspector General
United States Patent and Trademark Office
U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office FY 2009 FISMA Assessment of the Patent Cooperation Treaty Search Recordation System (PTOC-018-00) Final
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE
FOR OFFICIAL USE ONLY SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE Department of Transportation Report No. FI-2013-123 Date Issued: September 10,
Standard Operating Procedure
Standard Operating Procedure IT System Certification & Accreditation Process For Effective Date: 20080707 Expiration Date: 20110707 Responsible Office: Office of the Chief Information Officer Document
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
In Brief. Smithsonian Institution Office of the Inspector General. Smithsonian Institution Information Security Program
Smithsonian Institution Office of the Inspector General Smithsonian Institution In Brief Report Number A-11-05, May 15, 2012 Why We Did This Audit The Federal Information Security Management Act of 2002
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028)
MEMORANDUM FOR KATHERINE ARCHULETA Director FROM: SUBJECT: PATRICK E. McFARLAND Inspector General Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) The purpose of this memorandum
Management Advisory Postal Service Transformation Plan (Report Number OE-MA-03-001)
October 29, 2002 RALPH J. MODEN VICE PRESIDENT, STRATEGIC PLANNING SUBJECT: Management Advisory Postal Service Transformation Plan (Report Number ) This management advisory presents the results of our
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
International Trade Administration
U.S. DEPARTMENT OF COMMERCE Office of Inspector General International Trade Administration FY 2007 FISMA Assessment of Core Network General Support System (ITA-012) Final Inspection Report No. OSE-18840/September
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Christine M. Frye, CIPP/US, CIPM, Chief Privacy Officer, Bank of America
Christine M. Frye, CIPP/US, CIPM, Chief Privacy Officer, Bank of America Dana Simberkoff, JD, CIPP/US, Vice President, Risk Management and Compliance, AvePoint The Landscape Prevention and Response Planning
