IT Compliance in Acquisition Checklist v3.5 Page 1 of 7
|
|
|
- Ami McDowell
- 9 years ago
- Views:
Transcription
1 IT Compliance in Acquisition Checklist v3.5 Page 1 of 7 Instructions: This IT checklist, with appropriate signatures, must be completed for Information Technology (IT) acquisitions within the Department of Commerce (DOC). It represents a list of important or relevant actions (steps) that must be taken to ensure that security considerations are incorporated into IT acquisitions. te: Completion of this checklist is not required for the acquisition of equipment for specialized Research and Development (R&D) or scientific purposes that are not a National Security System. In completing the checklist, you can assume that if the answer to a question does not redirect you to a new question further down the checklist, you should proceed to the next question until you obtain the final concurrence signatures. Each checklist question should be addressed in coordination with the Acquisition team including: the Procurement Requestor from the program office, the Procurement Contracting Officer Representative (COR), Operating Unit Approved Program/ Requesting Office IT Security Officer, and Acquisition Contracting Official (CO). Step1 Step 4 Step 2 Step 5 Signed by OU IT Security Officer (or delegate) and, if necessary, OSY POC Step 3 Step 6 Reviewed by COR and CO Background: This checklist was developed to ensure that the acquisition of IT resources complies with Federal and DOC information security policy requirements and to provide a means for COs to document compliance. System(s): [Provide full name of system(s) and any corresponding acronym(s)] Procurement Description: [Provide 1-2 sentences on what the IT acquisition is for] 1 Does this acquisition involve a hardware or software product purchase? If the answer is, proceed to question 2. If the answer is, include appropriate clauses into the solicitation and contract to ensure this acquisition meets the following: DOC IT Security Program Policy ITSPP media sanitization requirements (MP-6) FAR (d) regulations involving NIST common security configuration checklists including Federal Desktop Core Configuration (FDCC) or United States Government Configuration Baseline (USGCB) initiative Personal identity verification requirements from FAR and FIPS PUB 201 [in accordance with Homeland Security Presidential Directive (HSPD-12)] FAR part requirements which state that unless the agency Chief Information Officer waives the requirement, when acquiring information technology using Internet Protocol, the requirements documents must include reference to the appropriate technical capabilities defined in the USGv6 Profile (NIST Special Publication (SP) ) and the corresponding declarations of conformance defined in the USGv6 Test Program. To meet this requirement each DOC acquisition of IP protocol technology must express requirements for IPv6 capabilities in terms of the USGv6 Profile (i.e., using the USGV6 Capabilities Check List) and vendors must be required to document their product s support of the requested capabilities through the USGv6 test program (reference using the USGv6 Suppliers Declaration of Conformity. Proceed to question 2.
2 IT Compliance in Acquisition Checklist v3.5 Page 2 of 7 2 Will any personnel involved in this acquisition perform a function/role that requires access to a system(s) that processes non-public or sensitive DOC data? For example, requiring a DOC account, system administrator access to a DOC system, vendor installation/maintenance, or contractor personnel operating system(s) that process DOC data. If the answer is, proceed to question 3. If the answer is, Contracting Officials should work with the COR to incorporate contract language from Commerce Acquisition Regulation (CAR) Final Rule 48 CFR 13, specifically: Determine and document contract risk using the Commerce Acquisition Manual Insert the appropriate clauses into the contract based on risk level. Select from the following Security Processing Requirements: 1) High or Moderate Risk Contracts CFR Ch ) Low Risk Contracts 48 CFR Ch ) National Security Contracts 48 CFR Ch ) Foreign National Visitor and Guest Access to Departmental Resources Determine and document appropriate FISMA requirements to be met in the contract, and assist in the coordination with DOC Office of Security (OSY) for personnel screenings, see Chapter 11 Investigative Processing, of the Manual of Security Policies and Procedures, and the IT Security Office involving DOC ITSPP requirements for a Security Assessment & Authorization (A&A). Take appropriate action, in consultation with the COR, OSY, and DOC Office of General Counsel, regarding the personnel screening forms. Determine the appropriateness of allowing interim access to DOC IT systems pending favorable completion of a pre-employment check. Incorporate appropriate clauses from FAR Security Requirements for Information Technology Resources into the solicitation and contract to ensure that the requirements, such as annual IT security awareness training, are enforceable on contract personnel. Take appropriate action, in consultation with your Privacy Officer, to ensure that the services, systems, and/or products being procured comply with existing privacy laws and policies regarding protection, maintenance, dissemination and disclosure of information. In consultation with the Contracting Officer, make sure FAR and all other applicable clauses protecting personal privacy interests are included (e.g., 48 CFR ). Proceed to question 3. 3 Will this acquisition involve Government property located at an off-site contractor-controlled facility that will be used for transmitting, processing, and storing DOC data? If the answer is, proceed to question 4. If the answer is, include FAR , Security Requirements for Information Technology Resources, into the solicitation and contract. Initiate the appropriate Security Assessment & Authorization (A&A) of the contractor system(s) involved and include clauses to ensure this acquisition meets DOC ITSPP security requirements for transmitting, processing, and storing data. Proceed to question 4. 4 Will this acquisition involve a service level agreement? For example, contractor maintenance on DOC system hardware or software, Software as a Service (SaaS), i.e., Cloud Computing, or External Data Storage or Contingency Emergency Back-up facility. If the answer is, proceed to question 5. If the answer is, initiate appropriate Security Assessment and Authorization of the contractor system(s) involved and include clauses to ensure this acquisition meets DOC ITSPP security requirements for transmitting, processing, and storing data, NIST SP Revision 1: Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (sp rev1-final.pdf) and SP Revision 2, Security Considerations in the
3 IT Compliance in Acquisition Checklist v3.5 Page 3 of 7 Information System Development Life Cycle (SP Revision2.pdf) involving nondisclosure of information. Ensure that data portability, data breach notification, and data disposal are considered in the contract. Insert clauses from Commerce Acquisition Manual Section 3.3 IT Service Contracts, into the contract. Also, ensure FAR part requirements cited on page 1, question 1 of this checklist are followed. Proceed to question 5. 5 Supply Chain Risk Assessment Requirements Part 1 Section 515 Supply Chain Risk Assessment (SCRA) Applicability: 5A. Is this an acquisition of new high-impact or moderate-impact information system? (A new high-impact or moderate-impact information system is defined as: acquisition of a new information system that is designated as FIPS 199 moderate-impact or high-impact; is subject to the reporting requirements of 44 U. S. C. Section 3505(c) FISMA Reportable System; and for which a new system inventory record will be created and entered into the CSAM in accordance with CITR- 019 Risk Management Framework (RMF). Reference CITR 023: Pre-Acquisition Supply Chain Risk Assessment Section 6.1 at If the answer to 5A is, a SCRA is required. If the answer to 5A is, a SCRA is not required. Part 2 National Security System (NSS) SCRA Applicability: 5B. Is this an acquisition for a NSS (Classified or Unclassified), including IT equipment and software? 5C If the answer to 5B is, is the acquisition exclusively for any of the following types of items? - Cabling (i.e. Cat 5 or Fiber Optic) - Cable Adaptors - Power Cable - Network Server Rack - Keyboard (Wired) - Mouse (Wired) - Items with no integrated circuitry (i.e. Monitor stands) If the answer to 5C is, a SCRA is not required. If the answer to 5C is, a SCRA is required. The OU OCIO or designee has reviewed this purchase and confirmed a SCRA is applicable. or is not OU OCIO Point of Contact: If a SCRA is required, a warranted CO shall conduct the buy, add required language in solicitation and contract documents, and transmit vendor-provided information to the OU OCIO or designee.
4 IT Compliance in Acquisition Checklist v3.5 Page 4 of 7 6 Do you have any supplemental information to add to this checklist? If the answer is, proceed to Signatures section below to obtain signatures. If the answer is, please attach appropriate supplemental information (i.e., project org chart, previous acquisition checklist) to this checklist and proceed to Signatures section below to obtain signatures. Signatures: By signing this checklist, the Information System Security Officer, Procurement COR, IT Security Officer and Contracting Officer are representing that operating unit information security management oversight and appropriate due diligence were considered for this acquisition process. Cognizant Office of Chief Information Officer Representative (OCIO) (if needed): Information System Security Officer (ISSO): Procurement COR: Operating Unit approved Program/Requesting Office IT Security Officer: Contracting Officer:
5 IT Compliance in Acquisition Checklist v3.5 Page 5 of 7 Question 5 Is this acquisition of a FIPS-199 High Impact or Classified IT system or components thereof?
6 IT Compliance in Acquisition Checklist v3.5 Page 6 of 7 References: Definition of Information Technology: includes hardware, application software, system software, and information (data). Information technology services include, but are not limited to, the management, operation (including input, processing, transmission, and output), maintenance, programming, and system administration of computer systems, networks, and telecommunications systems. [return to instructions] Commerce Acquisition Manual Chapter : Personnel Security Processing Requirements for DOC Service AM_ _Personnel_Security_Requirements.pdf Commerce Office of Security (OSY) Manual of Security Policies and Procedures: Federal Acquisition Regulation (FAR) Case , Internet Protocol Version 6 (IPv6): Federal Acquisition Regulation (FAR) Part (d) Policy: Use of Common Security Configurations ( references NIST website Federal Acquisition Regulation (FAR) Subpart 4.13: Personal Identity Verification Federal Acquisition Regulation Part (G) Policy: Acquiring information technology using Internet Protocol Federal Desktop Core Configuration (FDCC): OMB M-07-18, Ensuring New Acquisitions Include Common Security Configurations, IT Security Program Policy: ( National Checklist Program (NCP): United States Government Repository of Publicly Available Security Checklists ( NIST FIPS PUB Change tice 1: Personal Identity Verification (PIV) of Federal Employees and Contractors, March 2006, NIST SP : A Profile for IPv6 in the U.S. Government Version 1.0, July 2008, NIST SP Revision 1: Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach, February 2010, (sp rev1-final.pdf) NIST SP Revision 2: Security Considerations in the Information System Development Life Cycle, Revision 2, October 2008, (SP Revision2.pdf) NIST SP Revision 2: National Checklist Program for IT Products - Guidelines for Checklist Users and Developers, February 2011, Security Content Automation Protocol (SCAP) Validated Products: United States Government Configuration Baseline (USGCB): USGCB baseline initiative evolved from the Federal Desktop Core Configuration mandate ( USGv6: A Technical Infrastructure to Assist IPv6 Adoption:
7 IT Compliance in Acquisition Checklist v3.5 Page 7 of 7 Version Date Revised by Comment 3.5 7/31/15 A. Hintz (OCIO) Updated Question 5 to reflect CITR-023: Pre- Acquisition Supply Chain Risk Assessment requirements /16/14 D. Dubeau (NIST) Replaced incorrect PM reference with correct reference; fixed / checkbox fields 3.3 4/16/14 H. Wald (OCIO) Replaced PM under last OU ITSO signature box with PM ; corrected formatting of version table 3.2 4/15/14 P. McMahon (OCIO) Replaced PM with PM /14/14 P. McMahon (OCIO) Updated Question 5 per input from OSY 3.0 2/2014 P. McMahon (OCIO) Updated Question 5 with Section 515 legislation /2013 P. McMahon (OCIO) Updated to revise SCRM content per OSY & OAM /2013 P. McMahon (OCIO) Updated to include Supply Chain Risk Management requirements and minor content changes to address Operating Unit feedback /2011 P. McMahon (OCIO) Added additional IPv6 language and reference 2.6 3/2011 W. Graham (OCIO) Updated to include HSPD-12 requirements: FAR Subpart /2011 S. Lattanze (OCIO) Updated to include OMB IPv6 requirements: FAR Case /2010 A. Helzer (OCIO) Updated to remove reference to FAR Subpart 45.5 clause 2.4 8/2010 A. Helzer (OCIO) Updated to include OGC comments 2.3 6/2010 A. Helzer (OCIO) Updated to include OU comments 2.2 3/2010 A. Helzer (OCIO) Updated to include OCIO and OAM comments 2.1 8/2009 A. Helzer (OCIO) Updated to include OIG comments 2 4/2009 N. Gassama/A. Helzer Updated to include OMB FDCC requirements We appreciate your continued efforts to make the Department's IT security posture more effective and efficient. If you have any questions, please contact the Office of Cyber Security at [email protected].
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-703 23 April 2013 Information Technology IT Security VULNERABILITY
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY. HUD Handbook 2400.25 REV4.1
U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY HUD Handbook 2400.25 REV4.1 March 2016 Document Change History Version Number Date Description Author 2.0 November
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
Department of Veterans Affairs VA HANDBOOK 6500.6 CONTRACT SECURITY
Department of Veterans Affairs VA HANDBOOK 6500.6 Washington, DC 20420 Transmittal Sheet MARCH 12, 2010 CONTRACT SECURITY 1. REASON FOR ISSUE: This Handbook establishes the procedures to implement security
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES Report No.: ISD-IS-OCIO-0001-2014 June 2014 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum JUN 0 4 2014 To: From:
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
DEPARTMENTAL DIRECTIVE
ADMINISTRATIVE COMMUNICATIONS SYSTEM U.S. DEPARTMENT OF EDUCATION DEPARTMENTAL DIRECTIVE OM:5-101 Page 1 of 17 (07/16/2010) Distribution: All Department of Education employees Approved by: /s/ Winona H.
INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY
Privacy Incident Handling Guidance
Privacy Incident Handling Guidance Revised January 26, 2012 Basis for Privacy Incident Handling Guidance The following procedures establish governing policies and procedures for Privacy Incident handling
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
United States Department of Agriculture. Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle
THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The most effective way to protect
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT 5 FAM 621 GENERAL (Office of Origin: IRM/BMP/SPO/PMD) a. The strategic importance of Information Technology (IT) to the mission of the State Department
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security - Privacy Procedures Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY PRIVACY PROCEDURES 1. PURPOSE
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
How To Control A System
Department of the Interior Security Control Standard Awareness and Training April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19,dated 07/07/2005 GUIDANCE
Creating Effective Cloud Computing Contracts for the Federal Government
Creating Effective Cloud Computing Contracts for the Federal Government Best Practices for Acquiring IT as a Service A joint publication of the In coordination with the Federal Cloud Compliance Committee
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
Department of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
FITSP-Auditor Candidate Exam Guide
FITSP-Auditor Candidate Exam An Overview of the FITSP-A Certification 2010 Edition Copyright 2009-2010 FITSI 1 FITSP-Auditor Candidate Exam This page is left intentionally blank Copyright 2009-2010 FITSI
CYBER SECURITY PROCESS REQUIREMENTS MANUAL
MANUAL DOE M 205.1-5 Approved: Admin Chg 1: 9-1-09 Admin Chg 2: 12-22-09 CYBER SECURITY PROCESS REQUIREMENTS MANUAL U.S. DEPARTMENT OF ENERGY Office of the Chief Information Officer AVAILABLE ONLINE AT:
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
CMS Policy for Information Security and Privacy
Office of the Administrator Centers for Medicare & Medicaid Services CMS Policy for Information Security and Privacy FINAL Version 2.0 April 11, 2013 Document Number: CMS-OA-POL-SEC01-02.0 CMS Policy for
SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh
SYSTEM OF RECORDS NO.: OCIO/QN.01 SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281 SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh Street, SW, Washington
Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.
OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY
MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
GSA POLICY AND PROCEDURE. SUBJECT: Document Security for Sensitive But Unclassified Building Information
GENERAL SERVICES ADMINISTRATION Washington, DC 20405 PBS P 3490.2 GSA POLICY AND PROCEDURE SUBJECT: Document Security for Sensitive But Unclassified Building Information 1. Purpose. This directive describes
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS. Section 40.1. Purpose
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS Section 40.1. Purpose... 1 Section 40.2. Background... 2 Section 40.3. Scope and Applicability... 3
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
A. Title 44, United States Code, Chapter 35, Coordination of Federal Information Policy
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 138-01 Revision Number: 00 Issue Date: 4/10/2014 ENTERPRISE INFORMATION TECHNOLOGY CONFIGURATION MANAGEMENT This Directive
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
DOJ 2640.2F INFORMATION TECHNOLOGY SECURITY. Assistant Attorney General for Administration FOREWORD
DOJ 2640.2F Approval Date: November 26, 2008 Approved By: Distribution: Initiated By: LEE J. LOFTHUS Assistant Attorney General for Administration BUR/H-1; OBD/H-1; SPL-23 Department Chief Information
Essential Next Steps for the U.S. Government in the Transition to IPv6
Essential Next Steps for the U.S. Government in the Transition to IPv6 An Executive Summary for Agency Chief Information Officers of the Latest Federal Policies and Guidance for Continuing the Enterprise
Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM
Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs
INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION
INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION Report No.: 2015-ITA-017 November 2015 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
EPA Classification No.: CIO-2150.3-P-11.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM PHYSICAL AND ENVIRONMENTAL PROTECTION PROCEDURES V1.9 MAY 4, 2012 1. PURPOSE The
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation
Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport
Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport May 7, 2015 DHS OIG HIGHLIGHTS Audit of Security Controls for DHS Information Technology Systems
FedRAMP Master Acronym List. Version 1.0
FedRAMP Master Acronym List Version 1.0 September 10, 2015 Revision History Date Version Page(s) Description Author Sept. 10, 2014 1.0 All Initial issue. FedRAMP PMO How to Contact Us For questions about
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
Security Control Standard
Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
