DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
|
|
|
- Anis Quinn
- 9 years ago
- Views:
Transcription
1 DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans Affairs (VA) policy and responsibilities regarding cloud computing services for VA. 2. SUMMARY OF CONTENTS/MAJOR CHANGES: This Directive establishes policy, roles and responsibilities regarding evaluation for selection of secure cloud computing services for VA. This document also establishes VA policy for compliance with the Federal Chief Information Officer s (CIO) mandate for a Cloud First policy. The CIO s policy is intended to accelerate the pace at which the government will realize the value of cloud computing by requiring agencies to evaluate safe, secure cloud computing options before making any new technology investments. This is supported by current Federal laws, Office of Management and Budget mandates, National Institute of Standards and Technology recommendations, and VA Directive and Handbook 6500, Information Security Program. 3. RESPONSIBLE OFFICE: The Office of the Assistant Secretary for Information and Technology (005), Information Security (005R), Cyber Security (005R2) is responsible for the content contained in this Directive. 4. RELATED HANDBOOK: VA Handbook 6517, Cloud Computing Services (under development). 5. RESCISSIONS: None. CERTIFIED BY: BY DIRECTION OF THE SECRETARY OF VETERANS AFFAIRS: /s/ Roger W. Baker Assistant Secretary for Information and Technology /s/ Roger W. Baker Assistant Secretary for Information and Technology Distribution: Electronic Only
2 1. PURPOSE AND SCOPE CLOUD COMPUTING SERVICES a. The purpose of this Directive is to establish Department of Veterans Affairs (VA) policy for evaluating the use of cloud computing services within VA. This Directive establishes VA s policy to ensure compliance with Federal laws, Office of Management and Budget (OMB) mandates, National Institute of Standards and Technology (NIST) Special Publications (SP), the Federal Risk and Authorization Management Program (FedRAMP), and VA Directive and Handbook 6500, Information Security Program. b. Each agency Chief Information Officer (CIO) has been directed to comply with the Federal CIO s mandated, 25 Point Implementation Plan to Reform Federal Information Technology Management, dated December 9, 2010, for the Cloud First initiative. This is also in compliance with the revised OMB Circular A-94, Guidelines and Discount Rates for Benefit-Cost Analysis of Federal Programs. The initiative requires that agency CIO s implement cloud computing services whenever possible. The Federal CIO has established FedRAMP to provide a standard approach to Assessment and Authorization (A&A) (formerly Certification & Accreditation) cloud computing services and products. The Federal CIO has directed NIST to serve as the technical advisor for assessing risks in implementation that is focused on cloud computing solutions. The assessment of risk must be consistent with the sixstep Risk Management Framework identified in NIST SP , Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. c. FedRAMP is managed by the Federal CIO s Council on cloud computing and allows joint authorizations and continuous security monitoring services for government cloud computing systems intended for multi-agency use. Joint authorization of cloud providers results in a common security risk model that can be leveraged across VA in cooperation with other agencies. The use of this common security risk model provides a consistent baseline for cloud-based technologies. This common baseline ensures that the benefits of cloud-based technologies are effectively integrated across the various cloud computing solutions currently proposed within the government. There are three services that will be available for implementation. These services are the only services and platforms for implementation. The service models are: Cloud Software as a Service (SaaS); Cloud Platform as a Service (PaaS); and Cloud Infrastructure as a Service (IaaS). d. This Directive applies to all VA organizations and information technology (IT) resources including contracted IT systems acting on behalf of VA. 2. POLICY a. VA will comply with the requirements for a Cloud First policy as established by the Federal CIO. The CIO has required Agencies to evaluate the feasibility of a cloud service prior to hardware and software acquisition. b. VA will continuously identify and evaluate available business use cases for implementation of a cloud service. 3
3 VA DIRECTIVE 6517 FEBRUARY 28, 2012 c. The VA CIO, or designee, will review and approve/disapprove cloud computing business use cases for VA. VA will ensure that NIST security requirements for cloud computing services are met. d. VA will conduct and document a feasibility study for a cloud computing service prior to hardware and software acquisition. e. Each prospective cloud computing business use case will be tested from a secure, approved VA facility. The testing will occur prior to adoption of the service to ensure compliance and adherence to security measures according to NIST recommendations and VA regulatory authority. This will be conducted in accordance with an A&A standardized approach for cloud computing services based on NIST Best Practices prior to becoming operational. f. VA will consult with FedRAMP, as needed, to provide a standardized approach to A&A cloud computing services and products. The Federal CIO has established FedRAMP to identify requirements for cloud computing security controls and has directed NIST to serve as the technical advisor for assessing risks in implementation of these services. 3. RESPONSIBILITIES a. Secretary of Veterans Affairs is responsible for designating the VA CIO as the senior agency official responsible for the Department s IT program. b. Assistant Secretary for Information and Technology, as the CIO is responsible for the following: (1) Approving cloud computing services to be used in VA; (2) Establishing policies and procedures to ensure the provision of effective and secure cloud computing services to support the Federal CIO s mission for secure, cost-saving technological innovations to support VA s infrastructure, information systems, and data repositories; (3) Implementing a risk management approach to IT operations that applies risk categorizations to VA information and information systems; establish secure, cost-saving procedures for implementing cloud computing services whenever feasible, and ensures a balance between risk to information systems and cost-saving cloud computing services to preserve VA business requirements and support continuity of operations; (4) Monitoring, reviewing, and evaluating compliance with this Directive; and (5) As the overall VA system owner, delegating the daily operations and maintenance of responsibilities to VA officials, as appropriate. c. Deputy CIO, Service Delivery and Engineering is responsible for developing, procuring, integrating, modifying, maintaining, and implementation of security over VA information and information systems. Cloud computing responsibilities include: 4
4 (1) Assisting and coordinating with the VA information system owners in managing cloud computing services for VA information systems; and (2) Assisting and coordinating with VA information system owners in creating, maintaining and submitting cloud computing service change requests for continuous monitoring, implementation, or maintenance for approval to the Enterprise Security Change Control Board (ESCCB). d. Deputy Assistant Secretary (DAS) for Information Security, as VA Chief Information Security Officer, has authority over the VA enterprise cyber security budget and is responsible for ensuring that the capability of utilizing cloud computing services is properly identified and securely managed. In addition, the DAS for Information Security is responsible for: (1) Developing VA information security policies and procedures consistent with federal laws and guidance, and VA regulations and policies; (2) Reviewing VA information security policies and procedures related to information security that are under the management and oversight of other Department organizations; (3) Ensuring that all Memoranda of Understanding and Interconnection Security Agreements clearly define the security controls implemented to protect the confidentiality, availability, and integrity of VA information processed, stored, or transmitted within or between interconnected systems; (4) Ensuring voting representation on the ESCCB so that cloud computing services are executed in accordance with federal laws, OMB Circulars and Memoranda, and VA policies for privacy and records management; as well as the Federal CIO s mandated, 25 Point Implementation Plan to Reform Federal Information Technology Management dated December 9, 2010, for the Federal Government s Cloud First initiative. (5) Evaluating and testing the feasibility of cloud computing services to determine security control requirements prior to making recommendations for their adoption or refusal; and (6) Monitoring all cloud computing services for compliance with existing federal laws and VA policies in conjunction with FedRAMP stipulations as directed by the Federal CIO Council. e. Under Secretaries, Assistant Secretaries, and Other Key Officials are responsible for ensuring compliance with this Directive within their respective Administrations, Staff Organizations, and Program Offices by coordinating and collaborating with Office of Information and Technology officials. 4. TERMS AND DEFINITIONS a. Business use case: Simulations are conducted on a continual basis to determine whether selected business processes are feasible for a cloud service. The business use case may be recommended for implementation once the capability for a cloud service has been determined. The business use case simulation does not include VA security controls that may be required for implementation. 5
5 VA DIRECTIVE 6517 FEBRUARY 28, 2012 b. Cloud Infrastructure as a Service (IaaS): The capability available to the consumer is to provide processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). c. Cloud Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. d. Cloud Software as a Service (SaaS): The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based ). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. 5. REFERENCES a. 36 C.F.R. Part 1236, Electronic Records Management b. E-Government Act, P. L , 116 Stat (Dec 17, 2002) c. Federal CIO s mandated, 25 Point Implementation Plan to Reform Federal Information Technology Management, dated December 9, 2010, for the Federal Government s Cloud First initiative d. FIPS 140-2, Security Requirements for Cryptographic Modules e. FIPS 199, Standards for Security Categorization of Federal Information and Information Systems f. FIPS 200, Minimum Security Requirements for Federal Information and Information Systems g. NIST SP , Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach h. NIST SP rev. 3, Recommended Security Controls for Federal Information Systems 6
6 i. OMB Circular A-94, Guidelines and Discount Rates for Benefit-Cost Analysis of Federal Programs j. OMB Circular A-130, Management of Federal Information Resources k. OMB Memorandum M-08-27, Guidance for Trusted Internet Connection (TIC) Compliance l. VA Directive and Handbook 6500, Information Security Program 7
7 APPENDIX A ACRONYMS AND ABBREVIATIONS a. A&A: Assessment and Authorization (formerly Certification & Accreditation) b. CIO: Chief Information Officer c. DAS: Deputy Assistant Secretary d. ESCCB: Enterprise Security Change Control Board e. FedRAMP: Federal Risk and Authorization Management Program f. FIPS: Federal Information Processing Standards g. IaaS: Infrastructure as a Service h. IT: Information Technology i. NIST: National Institute of Standards and Technology j. OMB: Office of Management and Budget k. PaaS: Platform as a Service l. SaaS: Software as a Service m. SP: Special Publications n. TIC: Trusted Internet Connections o. VA: Department of Veterans Affairs A-1
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
Department of Veterans Affairs VA DIRECTIVE 6601 REMOVEABLE STORAGE MEDIA
Department of Veterans Affairs VA DIRECTIVE 6601 Washington, DC 20420 Transmittal Sheet February 27, 2007 REMOVEABLE STORAGE MEDIA 1. REASON FOR ISSUE: To establish policy for The Department of Veterans
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028)
MEMORANDUM FOR KATHERINE ARCHULETA Director FROM: SUBJECT: PATRICK E. McFARLAND Inspector General Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) The purpose of this memorandum
Department of Veterans Affairs VA Directive 6403 SOFTWARE ASSET MANAGEMENT
Department of Veterans Affairs VA Directive 6403 Washington, DC 20420 Transmittal Sheet July 02, 2015 SOFTWARE ASSET MANAGEMENT 1. REASON FOR ISSUE. This Directive establishes Department of Veterans Affairs
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 [email protected]
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
CSO Cloud Computing Study. January 2012
CSO Cloud Computing Study January 2012 Purpose and Methodology Survey Sample Survey Method Fielded Dec 20, 2011-Jan 8, 2012 Total Respondents Margin of Error +/- 7.3% Audience Base Survey Goal 178 security
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS
CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS April 2014 Cloud Conceptual Reference Model The ease of use a Cloud Consumer experiences results from a complex, behind-the-scenes, orchestration of interchangeable,
Department of Veterans Affairs VA DIRECTIVE 6402
Department of Veterans Affairs VA DIRECTIVE 6402 Washington, DC 20420 Transmittal Sheet August 28, 2013 MODIFICATIONS TO STANDARDIZED NATIONAL SOFTWARE 1. REASON FOR ISSUE. To set forth policies and responsibilities
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
Department of Veterans Affairs VA Directive 6311 VA E-DISCOVERY
Department of Veterans Affairs VA Directive 6311 Washington, DC 20420 Transmittal Sheet June 15, 2012 VA E-DISCOVERY 1. REASON FOR ISSUE: To establish policy concerning the care and handling of documents
Department of Veterans Affairs VA DIRECTIVE 6071
Department of Veterans Affairs VA DIRECTIVE 6071 Washington, DC 20420 Transmittal Sheet PROJECT MANAGEMENT ACCOUNTABILITY SYSTEM (PMAS) 1. REASON FOR ISSUE. To set forth policies and responsibilities for
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
Department of Veterans Affairs VA HANDBOOK 6500.6 CONTRACT SECURITY
Department of Veterans Affairs VA HANDBOOK 6500.6 Washington, DC 20420 Transmittal Sheet MARCH 12, 2010 CONTRACT SECURITY 1. REASON FOR ISSUE: This Handbook establishes the procedures to implement security
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
CLOUD COMPUTING. Additional Opportunities and Savings Need to Be Pursued
United States Government Accountability Office Report to Congressional Requesters September 2014 CLOUD COMPUTING Additional Opportunities and Savings Need to Be Pursued GAO-14-753 September 2014 CLOUD
Guidelines for Successful Cloud Investments by deborah collier Technology Policy Director
Cloud Computing 201: Guidelines for Successful Cloud Investments issue brief #2 / 2011 Cloud Computing 201: Guidelines for Successful Cloud Investments by deborah collier Technology Policy Director 1301
INFORMATION MANAGEMENT
United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate May 2015 INFORMATION MANAGEMENT Additional Actions Are Needed to Meet Requirements
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM
Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs
GAO INFORMATION TECHNOLOGY REFORM. Progress Made but Future Cloud Computing Efforts Should be Better Planned
GAO July 2012 United States Government Accountability Office Report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro
Cloud definitions you've been pretending to understand Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro You keep using that word cloud. I do not think it means what you think it
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services
O F F I C E O F IN S P E C TO R GENERAL Audit Report 2014-IT-C-016 Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services September 30, 2014 B O A R D O F G O V E R
Department of Veterans Affairs VA Directive 0057. VA Environmental Management Program
Department of Veterans Affairs VA Directive 0057 Washington, DC 20420 Transmittal Sheet January 15, 2010 VA Environmental Management Program 1. REASON FOR ISSUE. To update the Department of Veterans Affairs
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain
GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented
Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent
Cloud Security A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud Sean Curry Sales Executive, Aquilent The first in a series of audits DoD did not fully execute elements of the July 2012
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Esri Managed Cloud Services and FedRAMP
Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
FITSP-Auditor Candidate Exam Guide
FITSP-Auditor Candidate Exam An Overview of the FITSP-A Certification 2010 Edition Copyright 2009-2010 FITSI 1 FITSP-Auditor Candidate Exam This page is left intentionally blank Copyright 2009-2010 FITSI
Developing a Risk-Based Cloud Strategy
Developing a Risk-Based Cloud Strategy Trevor Simmons, ZigZag Associates Ltd David Stokes, Venostic Consulting 23rd April 2015, Chertsey 1 Introductions Tell us briefly Who you are Who you work for What
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
DoD Needs an Effective Process to Identify Cloud Computing Service Contracts
Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY
GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2010 INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing GAO-10-513
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Joan Hash, Pauline Bowen, Arnold Johnson, Carla
NASA Information Technology Requirement
NASA Information Technology Requirement NITR 2810-17 Effective Date: November 12, 2008 Expiration Date: May 16, 2011 System Maintenance Policy and Procedures Responsible Office: Office of the Chief Information
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service
Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
IT Compliance in Acquisition Checklist v3.5 Page 1 of 7
IT Compliance in Acquisition Checklist v3.5 Page 1 of 7 Instructions: This IT checklist, with appropriate signatures, must be completed for Information Technology (IT) acquisitions within the Department
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
PLATFORM & INFRASTRUCTURE AS A SERVICE
PLATFORM & INFRASTRUCTURE AS A SERVICE Creating New Efficiencies Industry Perspective Executive Summary It s undeniable that cloud computing has changed the way that government does business. With the
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Information Resource Management Directive 5000.05 USAP Information Security Architecture
The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.05 USAP Information Security Architecture Organizational Function Information
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Information Security Governance
Information Governance Government Considerations for the Cloud Computing Environment by Jamie Miller [email protected] Larry Candler [email protected] Hannah Wald [email protected] Table of Contents
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 200.1A Approved: SUBJECT: INFORMATION TECHNOLOGY MANAGEMENT 1. OBJECTIVES. The Department of Energy s (DOE) overarching mission, to advance the national,
ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT
MALACAÑANG PALACE MANILA BY THE PRESIDENT OF THE PHILIPPINES ADMINISTRATIVE ORDER NO. ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT WHEREAS, Section 24,
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
EPA Classification No.: CIO 2123.0-P-01.1 CIO Approval Date: 06/10/2013 CIO Transmittal No.: 13-003 Review Date: 06/10/2016
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-84, dated June 7, 2005 CONFIGURATION MANAGEMENT PROCEDURE 1 PURPOSE The purpose of this procedure is to describe the process EPA Program
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH
WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH Contents I. Private Cloud: Making IT a business partner
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
