4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.
|
|
|
- Anthony Johnston
- 9 years ago
- Views:
Transcription
1
2 d. To apply basic policy and principles of computer hardware and software management as they relate to Information Management and Information Technology (IMIT) and Information Systems (IS) associated with or connected to the CNATRA and NATRACOM Networks for NMCI. A) 2. Cancellation. CNATRAINST and NRSINST The focus of this revision is to separate the joint CNATRA/NRS instruction. The only revision markings used are to show other modifications. 3. Background. For a short background and transition synopsis of the Navy-Marine Corps Intranet (NMCI) contract number N D-6000, which was awarded by the Navy to Electronic Data Systems (EDS) on October 6, 2000, please refer to enclosure (1) for details. The contract is to build and maintain a secure world-wide network that will provide data, voice, video, and support capabilities to every Sailor, Marine and DON Civilian. 4. Objective. To provide guidelines for IS requirements and LCM support under NMCI. 5. Authority. The CNATRA Command Information Officer (CIO) is responsible for ensuring compliance with the DON Information Systems (IS) Life Cycle Management (LCM) Program under NMCI. The procedures and principles presented in these guidelines apply to all CNATRA and NATRACOM military and civilian employees (including government contractors) and all IT assets within CNATRA and NATRACOM claimancy. 6. Policy a. After implementation of NMCI, EDS Information Strike Force (ISF) team will furnish new hardware/software to each user. Ownership of existing DON equipment will be relinquished and change hands to the EDS ISF team, with a few exceptions for locally developed legacy-unique systems which are required by the mission whose connectivity has been certified and is residing on local servers. Support may or may not be under a Contract Line Item Number (CLIN) and Service Level Agreements (SLA). b. Initial NMCI assets in terms of hardware, software and support are determined for users' requirements by CNATRA CIO. A mission inventory analysis is furnished to the Information Strike Force (ISF) team for review and implementation in NMCI. Seats are allotted to users for interoperability and mission 2
3 requirements. After system installation, a user may have two (2) moves, add, change (MAC) per year without a fee. c. User support is provided for hardware/software/support issues by a central point of contact and resolved by EDS contractor personnel on-site. User on-line training is provided on the web as part of the contract. d. Hardware refresh (upgrades) are executed by EDS after 3 years. Software refresh (upgrades) are executed by EDS upon version changes and updated within a 3-month window period. NMCI equipment inventory and accreditation are executed by the ISF team. The Commander of the Task Force (CTF) is the NMCI Designated Approving Authority (DAA). e. All NMCI related documentation will flow from unit to respective Activity Customer Technical Representative (ACTR), to Deputy Customer Technical Representative (DCTR), then to CNATRA CIO. Any moves, adds, changes (MAC) that are required by users in terms of mission requirements for hardware, software, data, video, and support will be coordinated with an IT Acquisition Paper (ITAP) thru the local chain to ACTR, DCTR, then to CNATRA CIO for review and approval or disapproval. The ITAP form is documented in reference (k), paragraph 7. A copy of the form is available on the CNATRA website at at enclosure (1) (R of reference (k). f. Requirements will be analyzed and matched with respective NMCI CLINs and SLAs. Since this is a fee-for-service billed by EDS on a monthly basis per requirement, any MAC or additional support requirements will be reviewed on a case-by-case basis. 7. Responsibility. CNATRA CIO is the official authority for NMCI for CNATRA and NATRACOM units. All actions and documentations relative to NMCI will be channeled and coordinated through the CNATRA CIO office. Unit Commanding Officers will implement this policy and guidance within their commands upon NMCI implementation. 3
4
5 NMCI BACKGROUND AND TRANSITION SYNOPSIS CNATRAINST A 1. On October 6, 2000, the United States Navy and Marine Corps awarded a long term contract N D-6000 to a single commercial contractor, Electronic Data Systems (EDS), to build and maintain a secure world-wide network that will provide data, voice, video, and support capabilities to every Sailor, Marine and DON Civilian. The contract is known by its acronym as NMCI and stands for Navy Marine Corps Intranet (NMCI). It is intended to eliminate stovepipe systems and modernize the way DON and Marine Corps do business. It will get the government out of owning and operating information technology systems and transfer these functions to a fee-for-service performance-based contract with the private sector. The contract is mandatory for all DON and Marine Corps activities. 2. Chief of Naval Operations (CNO) OPNAV N6 has formed a Commander Task Force NMCI (CTF NMCI) to manage the project under the auspices of the Program Executive Officer (Information Technology) (PEO-IT). CTF NMCI will be responsible for NMCI operations for the Navy; and the USMC Director of Command, Control, Communications, and Computers (C4) will be responsible for operations on the Marine Corps side. 3. The mission of NMCI is to enable the sharing of information worldwide with those who need it, when they need it, and enhance the enterprise-wide work, training, and quality of life for every Marine, Sailor, and DON Civilian. EDS formed an Information Strike Force (ISF) team for transition, conversion, and implementation phases of users seats at installations for the entire DON and Marine Corps ashore and overseas at CONUS, Alaska, Hawaii, Guantanamo Bay (Cuba), Puerto Rico, and Iceland. The transition approach for the implementation of NMCI is designed in five (5) phases with the following approximate timelines: a. Phase 1 - Workforce Development (1 month). b. Phase 2a Detailed Engineering/Design and Build (3 months). c. Phase 2b - Equipment Transformation/Service Transition (3 months) cut over phase ; EDS will start assessing existing desktops. d. Phase 3 Achieving and Testing service level agreement (SLAs)(2 months). Initial Operation Capability (IOC) starts at the beginning of Phase 3. Enclosure (1)
6 e. Phase 4 Continuous Improvement/Optimize. f. Phase 5 Feedback/Production. 4. Users' seat management concept includes hardware, software, data, video, connectivity, and support capabilities. It encompasses the PC, network, security hardware and software, hardware/software maintenance, hardware/software refresh, e- mail, Web access, two unclassified user accounts, LAN/WAN/MAN connectivity, Non-Classified Internet Protocol Router Network (NIPRNET) (unclassified) or Secret Internet Protocol Router Network (SIPRNET) (classified) access, Help Desk support, deskside support, shared network printing, network file sharing, directory services, training. It includes 50MB /calendar storage per account and 200MB network personal file storage per account. 5. There are various seat types: Gold disk, fixed workstations (red, white, blue, thin client); portable (basic or high end); and embarkables (full and limited). Upgrades such as: high-end, mission critical, or classified connectivity are available for some of the seats. The specifications of the seats are available on the NMCI home page web site at enclosure (2). IT hardware technology will be refreshed every three years by EDS. The software updates will be refreshed by EDS as new version(s) are released by software manufacturers. 6. Aviation Training Classrooms, mission support software requirements and designs, development and system analysis tests, as well as certain legacy systems support will be in enclaves of NMCI Community of Interests (COI). They are logical groupings of users who have a requirement to access information that should not be made available to the general NMCI user population. Logical perimeters are established around the COI, using Defense in-depth Information Assurance (IA) mechanisms, security management and operational directions and will be separated from NMCI at large through Boundary Firewall suites. 7. Boundary 2 Firewall suites providing this function will mirror the NMCI solution for meeting Boundary 1 security requirements. Firewalls are a collection of hardware and software components that are used to provide protection for a defined set of users in a specified enclave. An example for primary entry points protection to external networks such as NIPRNET has been established by DON as Boundary 1. Under the Defense-in-Depth approach, Firewalls should be implemented at multiple layers (Regional, Metropolitan Area Network (MAN), Base Area Network (BAN), Local Area Network (LAN), etc.) to provide Enclosure (1) 2
7 additional layers of protection. Thus, Firewalls can be at Boundary Transport (BT) and Boundaries 1, 2, 3, and 4. Defense-in-Depth boundaries are defined as follows: a. Boundary Transport (BT), protects areas between NMCI, Transport Wide Area Network (WAN) and Remote NMCI Users. b. Boundary 1 (B1), protects areas between NMCI users and services located in DON Networks NIPRNET/SIPRNET) and external Internet. c. Boundary 2 (B2), protects area between NMCI and users/applications located in DON legacy networks. d. Boundary 3 (B3), protects areas between NMCI Community of Interest(s) (COI) and NMCI. e. Boundary 4 (B4), protects areas between NMCI Hosts and Servers. 8. Training Classrooms hardware, software and maintenance are procured and refreshed using NMCI CLINs or separate established contract vehicles. 3 Enclosure (1)
8 BLANK PAGE Enclosure (1) 4
9 WEB LINKS TO REFERENCES AND GLOSSARY Computer Security Act of 1987 (Public Law ) CNATRAINST A OMB Circular A OMB Circular A-130 of 8 Feb 96 DOD as of 24 Oct 02 (Information Assurance (IA)) 01p.pdf DODI as of 6 Mar 03 (IA Implementation) 02p.pdf DOD R of 30 Aug 93 (Joint Ethics Regulation) DODI of 30 Dec 97 (DITSCAP) p.pdf FY 2001 Defense Authorization Act of 2000 (Public Law ) see Title X, Section 2224, DOD IA Program, Government Information Security Reform OMB Circular A-130, Appendix III, Security of Federal Automated Information Resources ml OMB Circular A-130, Transmittal Memorandum No. 4, Management of Federal Information Resources Public Law , National Defense Authorization Act of 1996 (Section D and E, renamed as Clinger-Cohen Act of 1996) df Enclosure (2)
10 NMCI HOME PAGE NMCI CLIN INDEX NMCI SLA INDEX NMCI MASTER GLOSSARY OF ACRONYMS Enclosure (2) 2
4. Policy. All NMCI Outlook e-mail users will have the following file size allowances: a. 50 MB e-mail/calendar storage per account
practices. With the Navy approval of the NMCI contract to the EDS contractor, an efficiency had to be developed to streamline and revolutionize the way the Navy does business and conserve bandwidth. Therefore,
How To Manage The Navy Marine Corps Intranet
ATTACHMENT NO. 1 SEAPORT ENHANCED PERFORMANCE WORK STATEMENT DRPM, NMCI ENTERPRISE IT SERVICE MANAGEMENT SYYSTEM (EITSMS)/ NMCI ENTERPRISE TOOL (NET) Rev. 2, dated 30 Jan 2007 1.0 INTRODUCTION The Direct
Information Technology & Communications Department Organization N6
Information Technology & Communications Department Organization N6 Director, Information Technology & Communications Department N6 Deputy, Information Technology & Communications Department N6B Chart VI
Subj: NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE INTELLIGENCE INFORMATION SYSTEM (DODIIS) PUBLIC KEY INFRASTRUCTURE (PKI)
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 IN REPLY REFER TO OPNAVINST 5239.3A N2 OPNAV INSTRUCTION 5239.3A From: Chief of Naval Operations
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Marine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
How To Evaluate A Dod Cyber Red Team
CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 CJCSM 6510.03 DISTRIBUTION: A, B, C DEPARTMENT OF DEFENSE CYBER RED TEAM CERTIFICATION AND ACCREDITATION Reference(s): Enclosure F. 1. Purpose a. This manual,
Information Assurance Manual
THE SECRETARY OF THE NAVY SECNAV M-5239.1 Department of the Navy Information Assurance Program Information Assurance Manual Published By The Department of the Navy Chief Information Officer DEPARTMENT
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1215.17 January 29, 2014 USD(P&R) SUBJECT: Educational Requirements for Appointment to a Grade Above First Lieutenant or Lieutenant (Junior Grade) in a Reserve
ADS Chapter 544 Technical Architecture Design, Development, and Management
Technical Architecture Design, Development, and Management Document Quality Check Date: 01/02/2013 Partial Revision Date: 06/08/2010 Responsible Office: M/CIO/CE File Name: 544_010213 Functional Series
Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 7750.07 October 10, 2014 DoD CIO SUBJECT: DoD Forms Management Program References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction (DoDI)
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Applying the DOD Information Assurance C&A Process (DIACAP) Overview
Applying the DOD Information Assurance C&A Process (DIACAP) Overview C&A, Risk, and the System Life Cycle 2006 Hatha Systems Agenda Part 1 Part 2 Part 3 The C&A Challenge DOD s IA Framework Making C&A
Data at Rest Security in Navy/NMCI. Steven Gillis ONR Information Assurance Manager 10 January 2008
Data at Rest Security in Navy/NMCI Steven Gillis ONR Information Assurance Manager 10 January 2008 Agenda Data at Rest Security What is it? What are the policies? Existing Solutions in Navy Do DAR solutions
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.02 May 24, 2011 ASD(NII)/DoD CIO SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling References: See Enclosure 1 1. PURPOSE. This Instruction:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1100.13 January 15, 2015 USD(P&R) SUBJECT: DoD Surveys REFERENCES: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD) 5124.02
Information Technology
May 7, 2002 Information Technology Defense Hotline Allegations on the Procurement of a Facilities Maintenance Management System (D-2002-086) Department of Defense Office of the Inspector General Quality
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549. Joint Interoperability Test Command (JTE) 7 Jan 15
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 7 Jan 15 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
DEFENSE CONTRACT MANAGEMENT AGENCY PROCUREMENT, DEFENSE WIDE Fiscal Year (FY) 2002 Amended President's Budget
PROCUREMENT, DEFENSE WIDE Fiscal Year (FY) 2002 Amended President's Budget EXHIBIT TITLE PAGE Purpose and Scope/Justification of Funds 2 P-1 Summary 6 P-1C Comparison Report 7 PB-1 Summary of FY 2002-2003
How To Implement Itil V3
2009 NMCI Conference: Implementing ITIL Session 1: ITSM Process ITSM COE Agenda Background ITSM Overview ITIL and Service Delivery Adopting ITIL to NGEN SE&I Activities 2 Background Develop Government
STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending
United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549
Subj: DEPARTMENT OF THE NAVY INFORMATION ASSURANCE POLICY
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAV Y PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.3B DON CIO SECNAV INSTRUCTION 5239.3B From: Secretary of the Navy Subj: DEPARTMENT
Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
PERFORMANCE WORK STATEMENT. for. United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA)
PERFORMANCE WORK STATEMENT for United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA) Communications Directorate (A6) Task Management Tool (TMT) Support 1 TABLE OF CONTENTS Contract Number
UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS
5 FAM 870 NETWORKS (Office of Origin: IRM/BMP/GRP/GP) 5 FAM 871 ENTERPRISE NETWORKS (CT:IM-138; 01-18-2013) The Department currently has two enterprise networks: ClassNet and OpenNet. Only Department-issued
SECNAVINST 1560.4A ASN(M&RA) 01 Dec 2005. Subj: DEPARTMENT OF THE NAVY VOLUNTARY EDUCATION (VOLED) PROGRAM
DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, DC 20350-1000 SECNAVINST 1560.4A ASN(M&RA) SECNAV INSTRUCTION 1560.4A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY
DoD Needs an Effective Process to Identify Cloud Computing Service Contracts
Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549. Thanks
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 Thanks IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 7 Aug 13 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension
Department of Defense
Department of Defense DIRECTIVE NUMBER 8100.02 April 14, 2004 Certified Current as of April 23, 2007 ASD(NII) SUBJECT: Use of Commercial Wireless Devices, Services, and Technologies in the Department of
Navy Enterprise Resource Planning System Does Not Comply With the Standard Financial Information Structure and U.S. Government Standard General Ledger
DODIG-2012-051 February 13, 2012 Navy Enterprise Resource Planning System Does Not Comply With the Standard Financial Information Structure and U.S. Government Standard General Ledger Additional Copies
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.19 March 14, 2013 USD(P&R) SUBJECT: Voluntary Education Programs in Overseas Areas References: See Enclosure 1. 1. PURPOSE. This instruction: a. Reissues DoD
Advancing the U.S. Air Force Mission
Advancing the U.S. Air Force Mission IT Solutions, Professional & Technical Services Agile Support for Today s Operations, Reliable Innovation for Tomorrow s Missions An F-22 in Nevada returns to the
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) System Categorization: Moderate Version 1.5 May 30, 2013 Prepared by: Security & Compliance Services (SCS) and Infrastructure
Improvements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
CYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-217 27 MAY 2014 Communications and Information VOICE CALL SIGN PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications
Financial Management
January 6, 2006 Financial Management Report on Army Management of the Army Game Project Funding (D-2006-043) Department of Defense Office of Inspector General Constitution of the United States A Regular
HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES STATEMENT
NOT FOR PUBLICATION UNTIL RELEASED BY HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES STATEMENT OF DR. JOHN ZANGARDI ACTING DEPARTMENT OF THE NAVY CHIEF INFORMATION OFFICER
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3204.01 August 20, 2014 USD(AT&L) SUBJECT: DoD Policy for Oversight of Independent Research and Development (IR&D) References: See Enclosure 1 1. PURPOSE. This
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 7045.14 January 25, 2013 USD(C) SUBJECT: The Planning, Programming, Budgeting, and Execution (PPBE) Process References: See Enclosure 1 1. PURPOSE. This Directive:
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The
Discovery and Usage data for Software License Management
Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is
Report No. D-2009-097 July 30, 2009. Data Migration Strategy and Information Assurance for the Business Enterprise Information Services
Report No. D-2009-097 July 30, 2009 Data Migration Strategy and Information Assurance for the Business Enterprise Information Services Additional Information and Copies To obtain additional copies of this
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 7650.03 December 18, 2014 IG DoD SUBJECT: Follow-up on Government Accountability Office (GAO), Inspector General of the Department of Defense (IG DoD), and Internal
FUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
MHS Health Information Technology Transformation March 1, 2016
MHS Health Information Technology Transformation March 1, 2016 Colonel Richard Chip Terry Acting Military Health System Chief Information Officer Defense Health Agency Conflict of Interest Richard N. Terry,
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 12 Dec 13 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
DEPARTMENT OF DEFENSE Defense Commissary Agency Fort Lee, VA 23801-1800 DIRECTIVE. Social Media
DEPARTMENT OF DEFENSE Defense Commissary Agency Fort Lee, VA 23801-1800 DIRECTIVE Social Media DeCAD 100-04 Corporate Communication Directorate OPR: DeCA/BEC References: See Enclosure 1 1. PURPOSE. This
DEPARTMENT OF THE NAVY. OFFICE OF THE SECRETARY JAN 3a2006 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000
DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY JAN 3a2006 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 SECNAVINST 5090.8A ASN (I&E) SECNAV INSTRUCTION 5090.8A From: Subj: Secretary of the Navy POLICY
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-3 CJCSI 3155.01A DISTRIBUTION: A, B, C GLOBAL COMMAND AND CONTROL SYSTEM-JOINT (GCCS-J) OPERATIONAL FRAMEWORK POLICY References: a. DoD Directive (DoDD)
Security Requirements
Security Requirements MayMarch 2000 Prepared for: Department of the Navy Space and Naval Warfare Systems Command Naval Information Systems Security Office, PMW 161 San Diego, CA Page 1 of 57115558 1.1
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM Subject: Hardware and Software Management Approval: Brent Wahlquist Subject Number: IT-2 Transmittal
DoD s Efforts to Consolidate Data Centers Need Improvement
Inspector General U.S. Department of Defense Report No. DODIG-2016-068 MARCH 29, 2016 DoD s Efforts to Consolidate Data Centers Need Improvement INTEGRITY EFFICIENCY ACCOUNTABILITY EXCELLENCE INTEGRITY
Department of the Navy ebusiness Operations Office
ebus iness Innovation DON Card Management www.don-ebusiness.navsup.navy.mil Department of the Navy ebusiness Operations Office Presented by: Ms. Karen Meloy Deputy Commander, DON ebusiness Operations Office
raytek, Inc. Background Information and Capabilities
C raytek, Inc. Background Information and Capabilities About Us Craytek, Inc. was established in 2001 Incorporated in the state of Virginia 8a Certified through the SBA in June 2005 Certified Economically
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE COMMANDER AIR FORCE SPECIAL OPERATIONS COMMAND (AFSOC) AIR FORCE INSTRUCTION 33-114 AIR FORCE SPECIAL OPERATIONS COMMAND Supplement 16 OCTOBER 2008 Incorporating Change 1, 23 November 2011
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3305.15 August 13, 2015 USD(I) SUBJECT: DoD Human Intelligence (HUMINT) Training and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the
Acquisition. Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) October 3, 2002
October 3, 2002 Acquisition Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) Department of Defense Office of the Inspector General Quality Integrity Accountability Report Documentation
SEAPORT PERFORMANCE WORK STATEMENT. Navy Marine Corps Intranet (NMCI) Program Office Support Services
SEAPORT PERFORMANCE WORK STATEMENT Navy Marine Corps Intranet (NMCI) Program Office Support Services 1.0 INTRODUCTION The Program Manager (PM) for the Navy Marine Corps Intranet (NMCI) is acquiring Program
Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109)
August 17, 2004 Acquisition Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) Department of Defense Office of the Inspector General Quality
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities Wireless Infrastructure, Article 12-29-2011 The federal government, and the Department of
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549. Joint Interoperability Test Command (JTE) 27 Oct 14
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 27 Oct 14 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
DEPARTMENT OF THE NAVY COMMANDER NAVAL EDUCATION AND TRAINING COMMAND 250 DALLAS STREET PENSACOLA, FLORIDA 32508-5220
NETC NOTICE 5215 DEPARTMENT OF THE NAVY COMMANDER NAVAL EDUCATION AND TRAINING COMMAND 250 DALLAS STREET PENSACOLA, FLORIDA 32508-5220 Cane frp: Jan 16 From: Subj: Commander, NUMERICAL INDEX OF EFFECTIVE
Data Consolidation and Application Optimization (DCAO) Organization
Data Consolidation and Application Optimization (DCAO) Organization 11 February 2015 Presented to: DON CIO IT Conference San Diego Convention Center Mr. John Pope DCAO Director Space and Naval Warfare
Department of Defense MANUAL. Procedures for Ensuring the Accessibility of Electronic and Information Technology (E&IT) Procured by DoD Organizations
Department of Defense MANUAL NUMBER 8400.01-M June 3, 2011 ASD(NII)/DoD CIO SUBJECT: Procedures for Ensuring the Accessibility of Electronic and Information Technology (E&IT) Procured by DoD Organizations
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE Ref: (a) SECNAVINST 5210.8D, Department of the Navy Records Management Program, 31 December 2005 (b) SECNAV Manual M-5210.1, Department of the Navy,
Network Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
What is Unified Capabilities?
Unified Capabilities and Tactical Overview 7 May 2012 Version 3 What is Unified Capabilities? A Combat Support Agency Enterprise Network Convergence DoD Unified Capabilities Voice Video Data Tactical The
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.64 January 10, 2013 DA&M SUBJECT: Defense Contract Management Agency (DCMA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Estimating Cloud Computing Costs: Practical Questions for Programs
Estimating Cloud Computing Costs: Practical Questions for Programs Kathryn Connor RAND Corporation June 2014 In 2010, the OMB proposed Federal Agencies consolidate data centers to save money. In 2013,
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Fleet Rating Identification Engine Decision Support System (FLEET RIDE) Department of the Navy - BUPERS SECTION 1: IS A PIA REQUIRED? a. Will this Department of
DODIG-2013-105 July 18, 2013. Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets
DODIG-2013-105 July 18, 2013 Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets Additional Copies To obtain additional copies of this
