UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED 1
|
|
|
- Kelley Hunter
- 9 years ago
- Views:
Transcription
1 UNCLASSIFIED DNI Special Security Center Policy & Strategic Planning Division UNCLASSIFIED UNCLASSIFIED 1
2 UNCLASSIFIED Policy UNCLASSIFIED UNCLASSIFIED 2
3 Policy Core Objectives Review, revise, facilitate development of new policies to address mission needs Security policies balance protection and information sharing requirements Comprehensive and ongoing review/transition of security DCIDs to ICDs Restructure, clarify and ensure consistency of policies to enhance compliance Security standards to promote reciprocity Policy that provides standard interpretation and application throughout the IC Separate security policy content ( what ) from procedures ( how ) UNCLASSIFIED 3
4 Policy Outreach National Level Policy National Security Council (NSC) Policy Coordinating Committees (PCC) Office of Management and Budget (OMB) Information Security Oversight Office (ISOO) National Counterintelligence Executive (NCIX) Committee on National Security Systems (CNSS) Overseas Policy Board (OSPB) Information Sharing Environment Program Manager (ISE PM) DoD Policy USD (I) Intelligence Community Policy DDNI/PPR Intelligence Policy Advisory Group (IPAG) ADDNI/FR Foreign Relations Coordinating Committee (FRCC) ADNI CIO IC Information and Technology Governance Board Allied Collaboration Board ADDNI/SEC TK TEM Security Policy Advisory Group (SPAG) Industrial Policy National Industrial Security Program Policy Advisory Committee (NISPPAC) Industrial Security Working Group (ISWG) UNCLASSIFIED 4
5 Policy Development Process Need (DCID conversion, update or new) Expert Working Group or SSC Lead SSC Review Security Policy Advisory Group (SPAG) D/SSC Review ODNI Process DNI Security Board (DSB) (as determined by D/SSC) UNCLASSIFIED 5
6 Policy Structure ICD 700 Protection of National Intelligence ICPG Security Glossary ICPG Security Governance ICD 701 Unauthorized Disclosures ICD 702 Technical Surveillance Countermeasures ICD 703 Protection of SCI & Sources and Methods ICD 704 Personnel Security Standards ICD 705 Physical/Technical Security Standards ICD 706 CAPOC ICD 707 Center for Security Evaluation (CSE) ICD 708 Tempest UNCLASSIFIED 6
7 ICD 700 Protection of National Intelligence New Overarching Security Key Elements National Intelligence ADDNI/SEC Sensitive Compartmented Information (SCI) Controlled Access Programs Security Program Oversight Personnel Security Physical/Technical Security Information System Security Uniform Implementation Information Sharing Reciprocity Risk Management Criteria for Access UNCLASSIFIED 7
8 ICD 700 Protection of National Intelligence Key Elements cont. Insider Threat Security Awareness, Training and Education Cognizant Security Authority Individual Clearance/Access Approval Holders SSC CSE Status Pending DNI signature Two ICPGs Security Glossary SPAG review Governance TBD UNCLASSIFIED 8
9 ICD 701 Unauthorized Disclosures Replaced DCID 6/8 Key Elements Unauthorized Disclosures and Leaks of Classified Information Reporting Criteria Status Reporting DCID 6/8 Disposition Reporting Status ICD 701 Signed No ICPG UNCLASSIFIED 9
10 ICD 702 TSCM Replaces DCID 6/2 Key Elements Threat Assessments Telephone Security Countermeasures NCIX IC Manager for TSCM National Integrated TSCM Committee Major Change DCID 6/2 Funding Mechanism National Integrated TSCM Committee Status ICD 702 DDNI level l review One ICPG TSCM ICPG TSCM UNCLASSIFIED 10
11 ICD 703 Protection of SCI and Sources & Methods ICD 703 and ICPGs replace DCID 6/1, DCID 6/1 Security Policy Manual, DCID 1/20P, DCID 6/4 Annex E, DCID 6/6 and part of DCID 6/7 Key Elements SCI Intelligence Sources and Methods SSO Clearance/Access Approval Holders Types of Access Approvals Courier Operations Marking and Packaging Document Accountability, Transportation & Destruction Dissemination Controls Control Centers Contractor Program Reviews Security Awareness Programs Continuing Reporting Requirements (foreign travel, etc.) Contractor/Consultant Security Industrial & Acquisition Security Self Inspections UNCLASSIFIED 11
12 ICD 703 Protection of SCI and Sources & Methods Key Elements cont. Operations Security (OPSEC) Risk Management Reporting Requirements Non-NIP Executive Agent (CSA) Non-NIP Agencies & Departments Executive Office of the President Elements Legislative & Judicial Branch State/Local/Tribal Government with Access Law Enforcement Access Foreign Partners Major change Addition of foreign partner security Non-Title 50 Emergency Disclosure from DCID 6/6 Added Secretary of Homeland Security Third Agency Rule from DCID 6/6 Deleted requirement to remove identity of originating agency Removed limitation to disseminate only to Executive Branch of the US Government SOICs no longer add significant threat countries for foreign travel Only NTIPA & SETL to identify threat to SCI UNCLASSIFIED 12
13 ICD 703 Protection of SCI and Sources & Methods 6/1 Protection of Sources & Methods 6/1 Personnel Security 6/1 Physical Security 6/1 Technical Security ICD 703 6/6 6/6 Dissemination and Disclosure Under Emergency Conditions Use By and Dissemination Among Executive Branch Departments/Agencies of the US Government (3rd agency rule waiver) 1/20P Hazardous Official Travel 1/20P Hazardous Foreign Travel 1/20P SCI Debrief and Hazardous Travel 1/20P Country Annex (previously rescinded) ICPG Continuing Reporting 6/4 Reporting Requirements UNCLASSIFIED 13
14 ICD 703 Protection of SCI and Sources & Methods 6/1 Contractor/Consultant Security 6/1 SCI Information Services Centers & Security Officials 6/1 Information Security SCI Security Infractions, Violations, 6/1 Compromises and Unauthorized Disclosures 6/1 Program Security Reviews 6/4 Annex E Standards for SCI Security Awareness Programs 6/6 Release of Intelligence to Contractors and Consultants ICPG SCI Management 6/1 Legislative Branch Access to SCI 6/1 Judicial Branch Access to SCI ICPG Non-Title 50 New Foreign Partner Security ICPG Foreign Partners UNCLASSIFIED 14
15 ICD 703 Protection of SCI and Sources & Methods Use By and Dissemination Among Executive Branch Departments/Agencies 6/6 of the US Government (3rd agency rule waiver) 6/6 Authorized Control Markings 6/6 Use of Authorized Control Markings ICPG /6 Reporting Unauthorized Disclosures Dissemination 6/6 Responsibilities i of SOICs Controls (TBD) 6/6 Annual Report on the Use of Control Markings 6/6 Interpretation 6/6 Annex A ORCON 6/6 Annex B IMCON 6/7 NOFORN Criteria i New Risk Management ICPG Risk Management (TBD) UNCLASSIFIED 15
16 Replaces DCID 6/4 Key Elements UNCLASSIFIED ICD 704 Personnel Security Standards SSBI SSBI/PR Investigative Standards Quality Control Guidelines Adjudicative Guidelines Temporary Eligibility Appeals Procedures Denial or Revocation of Access Reciprocity of Eligibility Determinations Personal Reporting Requirements SCI Access Approval Database Continuing Reliability Monitoring UNCLASSIFIED 16
17 ICD 704 Personnel Security Standards Major Change Annex E, Standards for SCI Security Awareness Programs in the US Intelligence Community, movedtoicd703 Signal Flags Scattered Castles Issues 1 st and 2 nd generation Personnel Security Program Office Five ICPGs Investigations Adjudications Denials/Revocations Reciprocity Scattered Castles/Signal Flags (May be classified annex) UNCLASSIFIED 17
18 ICD 704 Personnel Security Standards 6/4 Personnel Security Standards 6/4 Exceptions to Personnel Security Standards ICD 704 6/4 Investigative Requirements and Standards 6/4 Temporary Eligibility for Access to SCI 6/4 Annex A Investigative Standards 6/4 Annex B Quality Control Guidelines for the SSBI ICPG Investigative Standards 6/4 Annex C Adjudication Guidelines ICPG Adjudicative Guidelines 6/4 Annex D Appeals Procedures: Denial or Revocation ICPG Denial, Revocation & Appeals ICPG /4 Annex F Reciprocity Reciprocity ICPG New Scattered Castles/Signal Flags Scattered Castles/Signal Flags UNCLASSIFIED 18
19 ICD 705 Physical/Technical Security Standards Replaces DCID 6/9 Key Elements SCIF Construction ti Standards d SCIF Administration Locking Devices Accreditation Checklist Accreditation Reciprocity SCIF Database Personnel Access Control Intrusion Detection Systems Telephone Security Portable Electronic Devices Acoustical Control & Sound Masking Emergency Co-Utilization of SCIFs Tactical Operations/Field Training Counterterrorism t Laser Toner Cartridges UNCLASSIFIED 19
20 ICD 705 Physical/Technical Security Standards Major Changes Separates policy from implementation ti standards d Specific forced entry specification Single standard (removed minimum ) Wall construction standard specified Requires Construction Security Plan Sets requirements for workers Provides flexibility for covert sites Defines the term Security-in-Depth UNCLASSIFIED 20
21 Issues UNCLASSIFIED ICD 705 Physical/Technical Security Standards Forced Entry Protection Alarm Response Time Ten ICPGs Forms Facilities inside the US Facilities outside the US Tactical SCIFs PEDs Acoustic Control Intrusion Detection ti Personnel Access Control Telecommunications SCIF Administration UNCLASSIFIED 21
22 ICD 705 Physical/Technical Security Standards 6/9 Policy and Concept ICD 705 6/9 Annex A SCIF Accreditation Checklist ICPG Forms 6/9 Construction Specifications 6/9 Physical Security Construction Policy ICPG Domestic SCIF ICPG Overseas SCIF 6/9 Annex C Tactical Operations ICPG Tactical SCIF 6/9 Annex D Electronic Equipment/Toner ICPG PEDs 6/9 Annex E Acoustical Control ICPG Acoustical Control 6/9 Annex B Intrusion Detection Systems ICPG Intrusion Detection 6/9 Annex F Personnel Access Controls ICPG Personnel Access Controls 6/9 Annex G Telephone Security ICPG Telecommunications 6/9 General Administrative ICPG SCIF Administration UNCLASSIFIED 22
23 ICD 706 CAPOC Replaces DCID 6/11 Key Elements Controlled Access Programs Restricted Collateral Information CAPOC SRG CAPCO CMIWG Classification Guidance Virtual Classification Manual (Annex) Register Major Change Potential SRG scope change One ICPG Controlled Access Program Governance/Management DCID 6/11 ICD 706 ICPG CAP Governance/Management UNCLASSIFIED 23
24 ICD 707 Center for Security Evaluation (CSE) New Define CSE roles and responsibilities Key Elements Construction o Security Review e Board (CSRB) References to: One ICPG TSCM responsibilities COOP/COG responsibilities CSRB New ICD 707 ICPG CSRB UNCLASSIFIED 24
25 New UNCLASSIFIED ICD 708 TEMPEST Standardize IC TEMPEST activities Specific guidance and interpretation of national standard Key Elements TEMPEST Inspectable Space Red/Black Separation Uniformity New Reciprocity RFID ICD 708 Risk Management UNCLASSIFIED 25
26 DCID Conversion DCID TOPIC ICD Comment 1/20P Hazardous Official Travel /20P Hazardous Foreign Travel /20P SCI Debrief and Hazardous Travel /20P Country Annex (previously rescinded) /1 Protection of Sources & Methods 703 6/1 Personnel Security 703 6/1 Physical Security 703 6/1 Technical Security 703 6/1 Contractor/Consultant Security /1 SCI Information Services Centers & Security Officials /1 Information Security /1 SCI Security Infractions, Violations, Compromises and Unauthorized Disclosures /1 Program Security Reviews /1 Legislative Branch Access to SCI Refer to Department of State s Security Environment Threat List (SETL) and NCIX' National Threat Identification and Prioritization Assessment (NTIPA) Items covered by ICD 704 will not be repeated Items covered by ICD 705 will not be repeated Items covered by ICD 702 will not be repeated. (nothing in this section is covered by ICD 705) Items covered by ICD 701 will not be repeated UNCLASSIFIED 26
27 DCID Conversion DCID TOPIC ICD Comment 6/1 Judicial i Branch Access to SCI /2 TSCM 702 6/3 Protecting SCI within Information Systems 500 Series All topics and appendices 6/4 Reporting Requirements /4 Annex E Standards for SCI Security Awareness Programs /4 Personnel Security Standards 704 6/4 Exceptions to Personnel Security Standards 704 6/4 Investigative Requirements and Standards /4 Temporary Eligibility for Access to SCI /4 Annex A Investigative Standards /4 Annex B Quality Control Guidelines for the SSBI /4 Annex C Adjudication Guidelines /4 Annex D Appeals Procedures: Denial or Revocation /4 Annex F Reciprocity UNCLASSIFIED 27
28 DCID Conversion DCID TOPIC ICD Comment 6/5 SAMI Rescind 6/6 Dissemination and Disclosure Under Emergency Conditions 703 6/6 Release of Intelligence to Contractors and Consultants /6 Use By and Dissemination Among Executive Branch Departments/Agencies of the US Government (3rd agency rule waiver) 6/6 Authorized Control Markings /6 Use of Authorized Control Markings will reference ICD this relates 6/6 Reporting Unauthorized Disclosures to UDs as a result of not handling per the control marking. 6/6 Responsibilities of SOICs /6 Annual Report on the Use of Control Markings /6 Interpretation /6 Annex A ORCON /6 Annex B IMCON /6 Release to Foreign Governments, International Organizations, and Coalition Partners 400 Series 6/6 Dissemination to Non-Governmental Foreign Nationals or Foreign Contractors 400 Series UNCLASSIFIED 28
29 DCID Conversion DCID TOPIC ICD Comment 6/6 Obsolete Restrictions and Control Markings Rescind 6/7 Intelligence Disclosure Policy 400 Series 6/8 Unauthorized Disclosures, Security Violations, and Other Compromises of 701 Intelligence Information 6/9 Policy and Concept 705 6/9 Annex A SCIF Accreditation Checklist /9 General Administrative /9 Annex C Tactical Operations /9 Annex D Electronic Equipment/Toner /9 Annex E Acoustical Control /9 Annex B Intrusion Detection ti Systems /9 Annex F Personnel Access Controls /9 Annex G Telephone Security /9 Construction Specifications /9 Physical Security Construction Policy /11 CAPOC 706 New Foreign Partner Security New Risk Management New Scattered Castles New Center for Security Evaluation 707 New Tempest 708 UNCLASSIFIED 29
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5105.21, Volume 3 October 19, 2012 USD(I) SUBJECT: Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Personnel Security, Industrial
INTELLIGENCE COMMUNITY STANDARD NUMBER 705-1
ICS 705-1 INTELLIGENCE COMMUNITY STANDARD NUMBER 705-1 PHYSICAL AND TECHNICAL SECURITY STANDARDS FOR SENSITIVE COMPARTMENTED INFORMATION FACILITIES (EFFECTIVE: 17 SEPTEMBER 2010) A. AUTHORITY: The National
INTELLIGENCE COMMUNITY STANDARD NUMBER 700-1
ICS 700-1 INTELLIGENCE COMMUNITY STANDARD NUMBER 700-1 GLOSSARY OF SECURITY TERMS, DEFINITIONS, AND ACRONYMS (EFFECTIVE DATE REMAINS: 4 APRIL 2008) NOTICE: RENUMBERING OF INTELLIGENCE COMMUNITY STANDARD
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5105.21, Volume 1 October 19, 2012 USD(I) SUBJECT: Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Information and Information
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5105.21, Volume 2 October 19, 2012 USD(I) SUBJECT: Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Physical Security, Visitor
Department of Defense MANUAL
Department of Defense MANUAL NUMBER O-5205.07, Volume 3 April 23, 2015 Incorporating Change 1, Effective September 21, 2015 USD(I) SUBJECT: DoD Special Access Program (SAP) Security Manual: Physical Security
Department of Defense
Department of Defense DIRECTIVE NUMBER 8100.02 April 14, 2004 Certified Current as of April 23, 2007 ASD(NII) SUBJECT: Use of Commercial Wireless Devices, Services, and Technologies in the Department of
Classified National Security Information Program for State, Local, Tribal and Private Sector Entities Implementing Directive
Classified National Security Information Program for State, Local, Tribal and Private Sector Entities Implementing Directive February 2012 Department of Homeland Security Office of the Chief Security Officer
Department of the Navy. Personnel Security Program
THE SECRETARY OF THE NAVY SECNAV M-5510.30 JUNE 2006 Department of the Navy Personnel Security Program Published By Chief of Naval Operations (N09N) Special Assistant for Naval Investigative Matters and
NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
OFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND EMERGENCY MANAGEMENT OAK RIDGE OFFICE OFFICE OF SCIENCE U.S. DEPARTMENT OF ENERGY
OFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND EMERGENCY MANAGEMENT OAK RIDGE OFFICE OFFICE OF SCIENCE U.S. DEPARTMENT OF ENERGY 3.0 OFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND
Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1
The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and
National Security Adjudicator Training Program
DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 E/S 00530 MEMORANDUM FOR: SUBJECT: Distribution National Security Adjudicator Training Program In my role as Security Executive Agent pursuant to
DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM
DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM APPROVAL DATE: JUNE 2009 DEPARTMENT OF HOMELAND SECURITY
Department of Defense DIRECTIVE. SUBJECT: National Security Agency/Central Security Service (NSA/CSS)
Department of Defense DIRECTIVE NUMBER 5100.20 January 26, 2010 DA&M SUBJECT: National Security Agency/Central Security Service (NSA/CSS) References: See Enclosure 1 1. PURPOSE. Under the authorities vested
This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.
Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the
1 Purpose The DOE M 470.4-4A, Information Security Manual states, All information security programs, practices, and procedures developed within DOE must be consistent with and incorporate the requirements
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: SPECIAL ACCESS PROGRAM MANAGEMENT
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: 08/12/2009 SPECIAL ACCESS PROGRAM MANAGEMENT This Directive establishes the Department
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook
Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Department of Defense MANUAL. DoD Information Security Program: Marking of Classified Information
Department of Defense MANUAL NUMBER 5200.01, Volume 2 February 24, 2012 Incorporating Change 2, March 19, 2013 USD(I) SUBJECT: DoD Information Security Program: Marking of Classified Information References:
Consultant Annual DoD Security Refresher
Consultant Annual DoD Security Refresher 1 About This Course This course should be taken by Consultants Only in this PDF format All others should take this course online LMPeople > LMCareers > Learning
A. Executive Order 12333, United States Intelligence Activities. B. Executive Order 12829, National Industrial Security Program.
1. Purpose Department of Homeland Security Management Directive System MD Number: 11045 Issue Date: 10/04/2004 PROTECTION OF CLASSIFIED NATIONAL SECURITY INFORMATION: ACCOUNTABILITY, CONTROL, AND STORAGE
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
Army Regulation 380 5. Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED
Army Regulation 380 5 Security Department of the Army Information Security Program Headquarters Department of the Army Washington, DC 29 September 2000 UNCLASSIFIED SUMMARY of CHANGE AR 380 5 Department
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 205.1A SUBJECT: DEPARTMENT OF ENERGY CYBER SECURITY MANAGEMENT Approved: 1. PURPOSE. The Department of Energy s (DOE s) overarching mission to advance
Department of Defense MANUAL. DoD Information Security Program: Overview, Classification, and Declassification
Department of Defense MANUAL NUMBER 5200.01, Volume 1 February 24, 2012 USD(I) SUBJECT: DoD Information Security Program: Overview, Classification, and Declassification References: See Enclosure 1 1. PURPOSE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
DoD 5220.22-M NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL
DoD 5220.22-M NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL February 28, 2006 February 28, 2006 FOREWORD As required by Executive Order 12829 and under the authority of DoD Directive 5220.22, National
Baseline Cyber Security Program
NNSA Policy Letter NAP-14.1-D Approved: Baseline Cyber Security Program NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Information Management and the Chief Information Officer AVAILABLE ONLINE AT:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8523.01 April 22, 2008 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) References: (a) DoD Directive C-5200.5, Communications Security (COMSEC) (U),
1 FAM 260 BUREAU OF DIPLOMATIC SECURITY (DS)
1 FAM 260 BUREAU OF DIPLOMATIC SECURITY (DS) (Office of Origin: DS/MGT/PPD) 1 FAM 261 ASSISTANT SECRETARY FOR DIPLOMATIC SECURITY (DS) 1 FAM 261.1 Responsibilities a. The Assistant Secretary for Diplomatic
Science/Safeguards and Security. Funding Profile by Subprogram
Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber
Telephone Security Equipment. Submission and Evaluation. Procedures COMMITTEE ON NATIONAL SECURITY SYSTEMS. CNSSI No.
COMMITTEE ON NATIONAL SECURITY SYSTEMS April 2013 Telephone Security Equipment Submission and Evaluation Procedures THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Department of Defense MANUAL. DoD Information Security Program: Protection of Classified Information
Department of Defense MANUAL NUMBER 5200.01, Volume 3 February 24, 2012 Incorporating Change 2, March 19, 2013 USD(I) SUBJECT: DoD Information Security Program: Protection of Classified Information References:
Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to:
PRESIDENTIAL POLICY DIRECTIVE 28 POLICIES AND PROCEDURES I. Introduction Presidential Policy Directive 28 regarding signals intelligence activities (hereinafter PPD-28 ), issued January 17, 2014, articulates
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.68 December 5, 2013 DA&M SUBJECT: Pentagon Force Protection Agency (PFPA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
The President. Part VII. Tuesday, January 5, 2010
Tuesday, January 5, 2010 Part VII The President Executive Order 13526 Classified National Security Information Memorandum of December 29, 2009 Implementation of the Executive Order Classified National
Department of the Navy. Information Security Program
THE SECRETARY OF THE NAVY SECNAV M-5510.36 Department of the Navy Information Security Program Published By Chief of Naval Operations (N09N) Special assistant for Naval Investigative Matters and Security
( U ) T H I S P A G E I N T E N T I O N A L LY L E F T B L A N K DODIG-2013-142 ii
( U ) T H I S PA G E I N T E N T I O N A L LY L E F T B L A N K DODIG-2013-142 ii Results in Brief DoD Evaluation of Over-Classification of National Security Information September 30, 2013 We also concluded
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Policy on Information Assurance Risk Management for National Security Systems
CNSSP No. 22 January 2012 Policy on Information Assurance Risk Management for National Security Systems THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security References: See Enclosure 1 1. PURPOSE a. Manual.
Department of Defense INSTRUCTION. Management, Administration, and Oversight of DoD Special Access Programs (SAPs)
Department of Defense INSTRUCTION NUMBER 5205.11 February 6, 2013 DoD SAPCO SUBJECT: Management, Administration, and Oversight of DoD Special Access Programs (SAPs) References: See Enclosure 1 1. PURPOSE.
UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE
JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)
Headquarters, U.S. Marine Corps MCO P5510.18A PCN 10208490600 UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP) DISTRIBUTION STATEMENT A: Approved
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
DOJ 2640.2F INFORMATION TECHNOLOGY SECURITY. Assistant Attorney General for Administration FOREWORD
DOJ 2640.2F Approval Date: November 26, 2008 Approved By: Distribution: Initiated By: LEE J. LOFTHUS Assistant Attorney General for Administration BUR/H-1; OBD/H-1; SPL-23 Department Chief Information
Part B of PPD-19 provides that "Any officer or employee of an executive branch agency
MEMORANDUM OF AGREEMENT BETWEEN FACILITIES, SECURITY AND CONTRACTING, THE PERSONNEL SECURITY APPEALS BOARD, AND THE OFFICE OF THE INSPECTOR GENERAL, U.S. OFFICE OF PERSONNEL MANAGEMENT ON ROLES AND RESPONSIBILITIES
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MISSION DIRECTIVE 39 7 MAY 2015 AIR FORCE OFFICE OF SPECIAL INVESTIGATIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications
Guideline for Identifying an Information System as a National Security System
NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C. Barker I N F O R M A T I O N S E C U R I T Y Computer Security Division Information
United States Department of Agriculture Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture s Office of Homeland Security and Emergency Coordination - Classification Management Audit Report 61701-0001-32
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through
Business Associate Agreement
Business Associate Agreement This Business Associate Contract (Agreement) is entered into by and between, as a Covered Entity as defined in relevant federal and state law, and HMS Agency, Inc., as their
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15
U.S. NUCLEAR REGULATORY COMMISSION MANAGEMENT DIRECTIVE (MD) MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15 Volume 12: Approved By: Security R. W. Borchardt Executive Director for Operations Date Approved:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: DoD Personnel Security Program (PSP) References: See Enclosure 1 NUMBER 5200.02 March 21, 2014 Incorporating Change 1, Effective September 9, 2014 USD(I) 1. PURPOSE.
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
2. Provide administrative support to the OIG DoD and its components that do not have administrative support capability. This support includes:
October 16, 2001 INSPECTOR GENERAL INSTRUCTION 5106.1 1 SUBJECT: Delegation of Authority to the Chief of Staff References: See Appendix A. A. Purpose. This Instruction delegates responsibilities and authorities
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Department of Commerce Office of Security. Initial Information Security Briefing
Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.
Computer Security Incident Reporting and Response Policy
SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;
12 FAM 270 SECURITY REPORTING REQUIREMENTS
12 FAM 270 SECURITY REPORTING REQUIREMENTS (CT:DS-231; 03-09-2015) (Office of Origin: DS/SI and DS/DO/ICI) 12 FAM 271 GENERAL (CT:DS-143; 02-12-2009) a. A national security clearance that is maintained
Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories
NIST Special Publication 800-60 Volume II Revision 1 Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories Kevin Stine Rich Kissel William C. Barker
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
GC GUIDANCE ON INHERENTLY GOVERNMENTAL FUNCTIONS
GC GUIDANCE ON INHERENTLY GOVERNMENTAL FUNCTIONS Federal law prohibits contractors from performing inherently governmental functions. But determining which functions may be performed by contractors and
Subj: NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE INTELLIGENCE INFORMATION SYSTEM (DODIIS) PUBLIC KEY INFRASTRUCTURE (PKI)
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 IN REPLY REFER TO OPNAVINST 5239.3A N2 OPNAV INSTRUCTION 5239.3A From: Chief of Naval Operations
FOREWORD. NCSC-TG-027 Library No. 5-238,461 Version-I
NCSC-TG-027 Library No. 5-238,461 Version-I FOREWORD The National Computer Security Center is issuing A Guide to Understanding Information System Security Officer Responsibilities for Automated Information
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
Table of Contents CDSE. Together, we will address evolving threats to national security so that we can keep our nation and the warfighter safe.
Table of Contents COUNTERINTELLIGENCE GENERAL SECURITY INDUSTRIAL SECURITY INFORMATION SECURITY INTERNATIONAL SECURITY Together, we will address evolving threats to national security so that we can keep
DSS Monthly Newsletter
(Sent on behalf of ISR) Dear FSO, DSS Monthly Newsletter December 2012 This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any
Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
INSIDER THREAT PROGRAM DEVELOPMENT TRAINING (INSIDER THREAT SECURITY SPECIALIST COURSE)
INSIDER THREAT PROGRAM DEVELOPMENT TRAINING (INSIDER THREAT SECURITY SPECIALIST COURSE) Presented by: Jim Henderson, CISSP, CCISO CEO, Insider Threat Defense, TopSecretProtection.com, Inc. Counterespionage-Insider
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014 Training Objectives FOCI Control Procedures
12 FAM 260 COUNTERINTELLIGENCE
12 FAM 260 COUNTERINTELLIGENCE 12 FAM 261 GENERAL (CT:DS-191; 03-29-2013) (Office of Origin: DS/DO/ICI) 12 FAM 261.1 Program Implementation a. The Department s counterintelligence (CI) program is defensive
Introduction. Derivative Classification Training JOB AID
Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job
JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE) www.cdse.
Center for Development of Security Excellence Learn. Perform. Protect. www.cdse.edu DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A Center for Development of Security Excellence (CDSE)
