AIR FORCE AUDIT AGENCY AIR FORCE PORTAL ACCESS AND RIGHTS MANAGEMENT AUDIT REPORT

Size: px
Start display at page:

Download "AIR FORCE AUDIT AGENCY AIR FORCE PORTAL ACCESS AND RIGHTS MANAGEMENT AUDIT REPORT"

Transcription

1 AIR FORCE AUDIT AGENCY AIR FORCE PORTAL ACCESS AND RIGHTS MANAGEMENT AUDIT REPORT F FB February 2008

2

3

4 Executive Summary INTRODUCTION OBJECTIVES CONCLUSIONS The Air Force Portal (AFP) provides authorized Air Force users with essential online access to timely, accurate, and trusted information and information technology services over a secured network. The AFP serves as the entry point to the Air Force s worldwide Intranet using a standard web browser. It is available to users anytime and anywhere an Internet connection is available from.com or.mil connections. Access, based on duty status, allows entry into the AFP while rights, based on assigned duties and responsibilities, define the nature and extent of access. Therefore, AFP administrators may grant elevated rights to personnel with information management responsibilities in the AFP. As of 1 June 2007, the AFP had over 906,000 registered users. We audited AFP access and rights because their effective management is essential to the security of Global Combat Support System-Air Force (GCSS-AF) and Air Force information. Our objective was to determine whether the Air Force effectively controlled user access and rights to the AFP. Specifically, we determined whether AFP access and rights were restricted to appropriate personnel. The Air Force could improve management and control of AFP user access and rights. Specifically: Major command (MAJCOM) and installation administrators did not effectively maintain access control over the AFP. Access must be controlled to protect the confidentiality, integrity, and availability of sensitive and critical information. (Tab A, page 1) The AFP Designated Approving Authority (DAA) did not develop a role-based access scheme for assigning rights to the AFP. Our limited assessment of users with elevated rights did not identify any individuals with rights incompatible with their assigned roles and responsibilities; however, a documented rolebased access scheme helps to ensure appropriate security measures are in place to limit AFP user ii

5 access to only the information and information technology resources they need to accomplish their assigned duties. (Tab B, page 5) RECOMMENDATIONS MANAGEMENT S RESPONSE FEDERAL INFORMATION SECURITY MANAGEMENT ACT We made five recommendations to improve controls over, and management of, AFP user access and rights. (Reference the individual Tabs for specific recommendations.) Management concurred with the audit results, and actions taken corrected the issues identified. The Federal Information Security Management Act (FISMA), as codified in Title III of the E-Government Act of 2002, Public Law , requires each Chief Information Officer to report material weaknesses in policies, procedures, or practices annually to the Office of Management and Budget. Recommendations A.1, A.2, A.3, and B.1 in this report address corrective actions needed to improve the effectiveness of information security controls. In our opinion, the material weaknesses identified meet the requirement for establishing an Air Force Plan of Action and Milestone. In addition, we will consider these weaknesses for inclusion in our annual FISMA input to the Secretary of the Air Force and to the DoD Inspector General. DERRICK D. H. WONG Associate Director (Information Systems Security and Communications Division) JUDITH L. SIMON Assistant Auditor General (Financial and Systems Audits)

6 Table of Contents Page EXECUTIVE SUMMARY i TAB A Access Controls 1 B Rights Management 5 APPENDIX I Background Information 7 II Audit Scope and Prior Audit Coverage 9 III Locations Audited/Reports Issued 11 IV Points of Contact 15 V Final Report Distribution 17

7 Tab A Access Controls BACKGROUND Access controls help ensure information is accessed and changed by only authorized personnel. Information in the AFP must be restricted to authorized users who have an official need. Therefore, policies and procedures must be established to manage user accounts in Air Force information systems. The DAA, 1 along with functional system owners and system developers, must ensure systems comply with access control requirements in Air Force Manual (AFMAN) , Identification and Authentication, 29 July AFMAN requires DAAs to: Disable and delete all user accounts from an information system whenever the user is permanently transferred to another location or terminates employment. Ensure procedures are in place to notify Network Control Center, workgroup manager, and system administrator when an employee (military, civilian, or contractor) transfers, retires, separates, or is terminated. Disable all accounts, excluding web applications and single sign on accounts, inactive over 45 days. DAAs must delete all disabled accounts 90 days from the date they were disabled. The GCSS-AF Integration Framework System Security Authorization Agreement (SSAA), Appendix E, Information System Security Policy (Final), April 2005, requires explicitly authorized user access by an official or implicit authorization derived from either official duty assignments or responsibilities. Therefore, MAJCOM and/or installation AFP administrators should monitor changes in user status (retirement, separation, or termination) and deactivate accounts when appropriate. AUDIT RESULTS 1 ACCESS CONTROLS Condition. MAJCOM and installation administrators did not effectively maintain access control over the AFP. Specifically, administrators did not deactivate AFP user and administrator accounts of personnel who retired, separated, or were terminated. Reconciling all active user accounts as of 20 November 2006 against personnel data retrievals 2 of retired, separated, or terminated Air Force military and civilian 1 The Deputy Director, Warfighter Systems Integration and Deployment (SAF/XCD-2), serves as the AFP DAA. 2 We retrieved data for retired, separated, and terminated civilian and military employees, including National Guard and Reserves, from the Military Personnel Data System (MILPDS) and Defense Civilian Personnel Data System (DCPDS) databases. 1

8 Tab A Access Controls personnel identified accounts remained active for: 85,863 (57 percent) of 150,626 retired or separated active duty personnel. 21,921 (31 percent) of 70,745 retired, separated, or terminated civilian personnel. 13, 635 (18 percent) of 76,872 retired or separated National Guard and Reserve personnel. Validating 3 the duty status of individuals for all 109 administrator accounts at 19 judgmentally selected installations identified 77 (71 percent) administrator accounts were no longer valid. The individuals had retired, transferred, separated, or were terminated and no longer associated with the Air Force, or performing duties requiring privileged access to the system (Table 1). Installation Reviewed Retired, Transferred, Terminated Currently Employed Aviano Air Base (AB) Cannon Air Force Base (AFB) Davis-Monthan AFB Elmendorf AFB Fairchild AFB F. E. Warren AFB Hickam AFB Hurlburt Field Lackland AFB Martin State Airport (Arpt) Maxwell AFB Gunter Annex Moody AFB National Capital Region Peterson AFB Pittsburgh Arpt/Air Reserve Station (ARS) Ramstein AB Randolph AFB Scott AFB Wright-Patterson AFB TOTALS Table 1. Administrators Duty Status Validation Cause. This condition occurred because the AFP system program office (SPO) did not provide MAJCOM and installation administrators with procedures or effective tools to monitor and deactivate AFP accounts. Consequently, administrators were not aware they were responsible for monitoring and deactivating accounts. Specifically: The AFP Tiered Administration User s Guide did not provide specific procedures 3 There were 135 administrator accounts at the 19 judgmentally selected installations. We confirmed duty status by interviewing assigned personnel at the former administrator s unit of record. However, we were able to validate the status of only 109 administrator accounts because, in certain instances, assigned personnel could not confirm the administrator s duty status. 2

9 Tab A Access Controls to monitor changes in user status (retirement, separation, or termination) and deactivate accounts when needed. For example, unit out-processing checklists at 17 (89 percent) of 19 installations did not include instructions to deactivate AFP user accounts when duty status changes. The Web Portal Manager tool provided to administrators was not capable of extracting user account data to monitor and ensure inactive accounts were disabled after 45 days and deleted 90 days thereafter. Impact. As a result, 49 (64 percent) of 77 administrators continued to log onto the system using their administrator accounts even after they separated or retired. Access must be controlled to protect the confidentiality, integrity, and availability of sensitive and critical information. Recommendation A.1. The Chief, Warfighting Integration and Chief Information Officer (SAF/XC) should direct the AFP SPO to immediately deactivate the accounts of the retired, separated, and terminated users (121,419) and administrators (77) cited in this report. Management Comments A.1. SAF/XC concurred and stated: The AFP SPO has deactivated the accounts of retired, separated, and terminated users (121,419) and administrators (77) cited in this report. CLOSED. Recommendation A.2. SAF/XC should direct the AFP SPO to revise the AFP Tiered Administration User s Guide to include procedures for monitoring changes in AFP user status and deactivating or deleting user accounts as required by AFM The procedures should require MAJCOM and installation AFP administrators to: a. Periodically monitor changes in user status (retired, separated, or terminated) to identify dormant accounts. We suggest developing an automated process to periodically reconcile user accounts with the Air Force Personnel Center (AFPC) or other personnel database. b. Deactivate or delete accounts after specific periods of inactivity. c. Include a requirement to deactivate or delete user accounts in unit out processing checklists. Management Comments A.2. SAF/XC concurred and stated: The AFP SPO has revised the AFP Tiered Administration User s Guide to include procedures for monitoring changes in AFP user status and deactivating or deleting user accounts required by AFMAN CLOSED. Recommendation A.3. SAF/XC should direct the AFP SPO provide MAJCOM and installation administrators a tool to monitor and identify inactive user accounts. 3

10 Tab A Access Controls Management Comments A.3. SAF/XC concurred and stated: The AFP SPO has provided MAJCOM and installation administrators a tool to monitor and identify inactive used accounts. CLOSED. Evaluation of Management Comments. Management comments addressed the issues raised in the findings, and management actions taken should correct the problems identified. 4

11 Tab B Rights Management BACKGROUND National Institute of Standards and Technology Draft Special Publication A, Guide for Assessing the Security Controls in Federal Information Systems, June 2007, requires system administrators to enforce the most restrictive set of rights 4 or access users need to perform specific tasks. The DAA (or the Information Assurance Manager [IAM], if delegated) must develop and implement a role-based access scheme to account for all privileged access rights, and implement the principles of least privilege and separation of duties. Under the least privilege principle, users with elevated rights are only granted access to (a) data; (b) control information, software, hardware, and firmware for which they are authorized and have a need-to-know; and (c) those roles and privileges they are authorized based on their functional duties. The DAA must also maintain visibility over all individuals assigned privileged user rights to ensure they comply with separation of duties and personnel security requirements. Privileged users are individuals with rights and capabilities beyond read 5 in an information system. For example, a privileged user assigned content publisher rights can typically read, write, add, modify, or delete files, while those assigned content manager rights can also grant publishing and management rights to other users. AUDIT RESULTS 2 RIGHTS MANAGEMENT Condition. The AFP DAA did not develop a role-based access scheme for assigning rights to the AFP. Specifically, although AFP security policy 6 requires explicitly authorizing and assigning rights (no access by default ), the DAA did not define the specific access rights and roles authorized or identify the responsible approval authority. 7 For example, AFP SPO personnel were provided elevated rights such as database and system administrators, and MAJCOM personnel were provided content publisher and manager rights. However, the security policy did not explicitly authorize these rights, or define the corresponding duties and responsibilities. Further, rights were provided by default since approval authority was not officially designated. To illustrate, MAJCOMs 4 The privileges a user or role has on an information system. 5 In computer terminology, read means transferring information from one storage medium or device to another. For example, data is read from disk to a computer screen. 6 GCSS-AF Integration Framework System Security Authorization Agreement (SSAA), Appendix E, Information System Security Policy (Final), April The recently released draft AFI , Web and Air Force Portal Management and Internet Use, did not assign a specific office the responsibility and authority to grant privileged access on the GCSS-AF/AFP. 5 FOR OFFICIAL USE ONLY

12 Tab B Rights Management assigned content manager and publisher rights by simply notifying the AFP SPO project manager through SAF/XC Exploitation Branch contractor personnel. Cause. This condition occurred because neither the AFP IAM 8 nor the SPO project manager, who were delegated to prepare and maintain the security policy, were aware the policy needed to include a role-based access scheme. Impact. A limited review of users with elevated rights did not reveal any individuals with rights incompatible with their assigned role and responsibilities. However, a documented role-based access scheme helps to ensure appropriate security measures are in place limiting AFP user access to only the information and information technology resources they need to accomplish their assigned duties. Recommendation B.1. SAF/XC should direct the AFP DAA to document a role-based access scheme for the AFP in the AFP security policy. As a minimum, the scheme should identify the types and levels of user access authorized in relation to the user s roles, tasks, duties and responsibilities, and the approval authority for granting each type of access. Management Comments B.1. SAF/XC concurred and stated: The AFP DAA has revised AFP security policy to document a role-based access scheme. The role-based access scheme in the policy identifies types and levels of user access authorized in relation to the user s roles, tasks, duties and responsibilities, and approval authority for granting each type of access. CLOSED. Recommendation B.2. SAF/XC should require the IAM and/or the SPO project manager to re-validate rights currently granted users against the role-based access scheme and adjust rights accordingly. Management Comments B.2. SAF/XC concurred and stated: The IAM and the SPO project manager have re-validated and adjusted privileged access rights granted users against the role-based access scheme. CLOSED. Evaluation of Management Comments. Management comments addressed the issues raised in the findings, and management actions taken should correct the problems identified. 8 The IAM is a contractor assigned to the 643d Electronic Systems Squadron based at Gunter Annex, Maxwell AFB AL. 6 FOR OFFICIAL USE ONLY

13 Background Information THE AIR FORCE PORTAL A portal is an Internet website that acts as a starting point with links to many other websites. In December 2002, the Air Force launched the AFP to provide the primary means for accessing and presenting timely, accurate, and trusted information and information technology services to all personnel supporting the Air Force mission. The AFP provides self-service information access to any Air Force user through a standard web browser. The AFP is the GCSS-AF presentation layer 9 that provides core enterprise services to all applications, thus reducing the cost of developing and integrating applications, while promoting security and interoperability standards. Access to sensitive data residing on the AFP should be restricted to authorized users who have an official need for the information. SAF/XC oversees the AFP and establishes policy and guidance for website content, publications, and forms. INFORMATION ASSURANCE The DoD defines information assurance as information operations protecting information and information systems by ensuring their confidentiality, integrity, authentication, availability, and nonrepudiation. Confidentiality. Information is seen and accessed only by intended recipients. Confidentiality is created primarily by using protocols that use encryption. Integrity. Information received is the same information transmitted by the originator. Authentication. Identifying an individual or computer to ensure access to information is authorized. Authentication goes hand-in-hand with confidentiality and integrity. Availability. Information (voice, video, and data) and supporting service resources (server, local networking infrastructures and transport medium) are up and running when needed. Nonrepudiation. Individual cannot deny sending or receiving information. 9 The presentation layer is the sixth of the 7-layer open systems interconnect (OSI) reference model. The sixth layer is concerned with protocols for network security, file transfers, and format functions. FOR OFFICIAL USE ONLY 7 Appendix I

14 This Page Intentionally Left Blank 8

15 Audit Scope and Prior Audit Coverage AUDIT SCOPE Audit Coverage. We performed audit work at 19 judgmentally selected installations. We accomplished the work from July 2006 to June 2007 using documents (AFP user listing, AFPC database, security policy, system printouts, and outprocessing checklists) dated from 1 November 1991 through 4 April We provided a draft report to management in November To accomplish the audit objectives we performed the following tests: Access Control. We reconciled all 882,592 AFP user accounts as of 20 November 2006 by comparing accounts in the AFP database against the user s duty status in the MILPDS and DCPDS databases. In addition, at the judgmentally selected installations, we validated the duty status of all system administrators through interviews and reviewing the functional duties they performed. Finally, we reviewed procedures and guidance administrators used to manage user accounts. Rights Management. We reviewed AFP security policy and other documentation to determine the specific rights and permissions authorized. Further, we interviewed SAF/XC, SPO, and Defense Information Systems Agency personnel concerning roles and privileges granted. Finally, we compared elevated rights authorized for the AFP against those assigned to administrators. Sampling Methodology. We used the following sampling concepts and Computer- Assisted Auditing Tools and Techniques (CAATTs) to complete this audit: Sampling. We judgmentally selected for review Headquarters Air Force and two installations from each of the eight MAJCOMs and Air National Guard with the highest number of administrators. CAATTS. We used Microsoft ACCESS to convert text files from the AFP active user account database (as of 20 November 2006), and personnel retirement, separation, and termination data from the MILPDS and DCPDS databases. We used the ACCESS merge, sort, query, and filter functions to compare and analyze the active user account data against the personnel data. Data Reliability. We relied on computer-processed data to perform this audit. Specifically, we used computer-generated data obtained from Tivoli Access Manager, MILPDS, and DCPDS personnel systems. To establish data reliability, we validated the duty status of a judgmental sample of administrators with personnel from the administrators unit of record. Based on these tests, we determined the data were sufficiently reliable to support audit conclusions. 9 Appendix II

16 Audit Scope and Prior Audit Coverage Auditing Standards. We conducted audit work in accordance with generally accepted government auditing standards, and, accordingly, included tests of key internal controls associated with maintaining, deactivating, and deleting AFP accounts; approving administrator and privileged access rights; and granting roles in the AFP. PRIOR AUDIT COVERAGE We did not identify any Air Force Audit Agency, DoD Inspector General, or Government Accountability Office reports issued within the past 5 years that addressed the same or similar objectives as this audit. Appendix II 10

17 Locations Audited/ Reports Issued Organization/Location Installation-Level Reports Issued Headquarters Air Force (HAF) AF/A4 Washington DC SAF/FM Washington DC Air Force Financial Systems Operations F FDD000 Maxwell AFB Gunter Annex AL 10 May th Communications Group Bolling AFB DC Air Combat Command 27th Fighter Wing Cannon AFB NM 355th Wing Davis-Monthan AFB AZ Air Education and Training Command (AETC) HQ AETC Randolph AFB TX Air Force Personnel Center Randolph AFB TX 12th Flying Training Wing Randolph AFB TX FREEDOM OF INFORMATION ACT The disclosure/denial authority prescribed in AFPD 65-3 will make all decisions relative to the release of this report to the public. 11 Appendix III

18 Locations Audited/ Reports Issued Organization/Location Installation-Level Reports Issued Air Education and Training Command (AETC) (Cont d) 37th Training Wing Lackland AFB TX 42d Air Base Wing Maxwell AFB AL - Gunter Annex Air Force Materiel Command (AFMC) HQ AFMC Wright-Patterson AFB OH Aeronautical Systems Center Wright-Patterson AFB OH 643d Electronic Systems Squadron F FDD000 Maxwell AFB - Gunter Annex AL 13 June th Electronic Systems Group F FDD000 Maxwell AFB - Gunter Annex AL 18 June 2007 Air Force Space Command 21st Space Wing Peterson AFB CO 90th Space Wing F. E. Warren AFB WY Air Force Special Operations Command (AFSOC) HQ AFSOC F FDD000 Hurlburt Field FL 24 July st Special Operations Wing Hurlburt Field FL 23d Wing F FCR000 Moody AFB GA 25 May 2007 Appendix III 12

19 Locations Audited/ Reports Issued Organization/Location Installation-Level Reports Issued Air Mobility Command (AMC) HQ AMC Scott AFB IL 92d Air Refueling Wing Fairchild AFB WA 375th Airlift Wing Scott AFB IL Air National Guard 171st Air Refueling Wing Pittsburgh Airport PA 175th Wing Martin State Airport MD Field Operating Agencies Air Force Communications Agency Scott AFB IL Pacific Air Forces 3d Wing Elmendorf AFB AK 15th Air Wing Hickam AFB HI 611th Air Operations Wing Elmendorf AFB AK FREEDOM OF INFORMATION ACT The disclosure/denial authority prescribed in AFPD 65-3 will make all decisions relative to the release of this report to the public. 13 Appendix III

20 Locations Audited/ Reports Issued Organization/Location Installation-Level Reports Issued United States Air Forces in Europe 31st Fighter Wing Aviano AB, Italy 86th Airlift Wing Ramstein AB, Germany Appendix III 14

21 Points of Contact Information Systems Security and Communications Division (AFAA/FSS) Financial and Systems Audits Directorate th Street March ARB CA Derrick D. H. Wong, Associate Director DSN Commercial (951) Ronald P. Saclolo, Program Manager Ramesh Bharania, Audit Manager We accomplished this audit under project number F2006-FB Appendix IV

22 This Page Intentionally Left Blank 16

23 Final Report Distribution SAF/AA SAF/OS SAF/US SAF/FM SAF/IG SAF/LL SAF/PA SAF/XC, AF/A6 AF/CC AF/CV AF/CVA AF/A3/5 AF/A8 AF/RE AF/XP NGB/CF ACC AETC AFMC AFMIA AFNETOPS AFRC AFSOC AFSPC AIA AMC ANG PACAF USAFA USAFE Units/Orgs Audited AU Library DoD Comptroller OMB FREEDOM OF INFORMATION ACT The disclosure/denial authority prescribed in AFPD 65-3 will make all decisions relative to the release of this report to the public. 17 Appendix V

24 This Page Intentionally Left Blank 18

25 To request copies of this report or to suggest audit topics for future audits, contact the Operations Directorate at (703) (DSN ) or to Certain government users may download copies of audit reports from our home page at Finally, you may mail requests to: Air Force Audit Agency Operations Directorate 1126 Air Force Pentagon Washington DC

AIR FORCE AUDIT AGENCY AIRCRAFT CONFIGURATION MANAGEMENT AUDIT REPORT

AIR FORCE AUDIT AGENCY AIRCRAFT CONFIGURATION MANAGEMENT AUDIT REPORT AIR FORCE AUDIT AGENCY AIRCRAFT CONFIGURATION MANAGEMENT AUDIT REPORT F2009-0008-FC2000 4 September 2009 Executive Summary INTRODUCTION Configuration management is the detailed process of recording and

More information

AIR FORCE AUDIT AGENCY CANCELLED IRAQ RECONSTRUCTION PROGRAM TASK ORDERS AUDIT REPORT

AIR FORCE AUDIT AGENCY CANCELLED IRAQ RECONSTRUCTION PROGRAM TASK ORDERS AUDIT REPORT AIR FORCE AUDIT AGENCY CANCELLED IRAQ RECONSTRUCTION PROGRAM TASK ORDERS AUDIT REPORT F2008-0013-FD1000 11 September 2008 Executive Summary INTRODUCTION OBJECTIVES The Air Force Center for Engineering

More information

Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency

Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Additional Copies To obtain additional copies of this report, visit the Web site of

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. NOTICE: This publication is available digitally on the AFDPO WWW site at: http://afpubs.hq.af.mil.

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. NOTICE: This publication is available digitally on the AFDPO WWW site at: http://afpubs.hq.af.mil. BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-204 21 September 2001 Communications and Information INFORMATION ASSURANCE (IA) AWARENESS PROGRAM COMPLIANCE WITH THIS PUBLICATION IS

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

Report No. D-2009-059 March 6, 2009. Air Force Management of the U.S. Government Aviation Into-Plane Reimbursement Card Program

Report No. D-2009-059 March 6, 2009. Air Force Management of the U.S. Government Aviation Into-Plane Reimbursement Card Program Report No. D-2009-059 March 6, 2009 Air Force Management of the U.S. Government Aviation Into-Plane Reimbursement Card Program Additional Information and Copies To obtain additional copies of this report,

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

INSTALLATION REPORT OF AUDIT

INSTALLATION REPORT OF AUDIT INSTALLATION REPORT OF AUDIT F2010-0034-FCI000 Impresa Contract Implementation 309th Maintenance Wing Hill AFB UT Hill Area Audit Office 8 March 2010 Executive Summary INTRODUCTION OBJECTIVES In January

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MANUAL 34-315 6 MARCH 2013 Services AIR FORCE NONAPPROPRIATED FUND (NAF) EMPLOYEES 401(K) SAVINGS PLAN COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-217 27 MAY 2014 Communications and Information VOICE CALL SIGN PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

AIR FORCE AUDIT AGENCY 44* COMPUTER NETWORK INCIDENT RESPONSE AND REPORTING AUDIT REPORT

AIR FORCE AUDIT AGENCY 44* COMPUTER NETWORK INCIDENT RESPONSE AND REPORTING AUDIT REPORT AIR FORCE AUDIT AGENCY 44* COMPUTER NETWORK INCIDENT RESPONSE AND REPORTING AUDIT REPORT F2011-0004-FB4000 20 April 2011 Executive Summary INTRODUCTION OBJECTIVES Incident response and reporting involves

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

INSTALLATION REPORT OF AUDIT

INSTALLATION REPORT OF AUDIT . INSTALLATION REPORT OF AUDIT F2009-0068-FBS000 Privatized Housing Fire and Police Services 17th Training Wing Goodfellow AFB TX Southwest Area Audit Office 16 September 2009 Executive Summary INTRODUCTION

More information

ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165

ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165 it ort YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165 May 24, 1999 Office of the Inspector General Department of Defense Additional Copies To obtain additional

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 Department

More information

SUBJECT: Privileged Access to Army Information Systems and Networks. a. Army Regulation (AR) 25-2, Information Assurance (IA), 23 March 2009.

SUBJECT: Privileged Access to Army Information Systems and Networks. a. Army Regulation (AR) 25-2, Information Assurance (IA), 23 March 2009. DEPARTMENT OF THE ARMY OFFICE OF THE SECRETARY OF THE ARMY 107 ARMY PENTAGON WASHINGTON DC 20310-0107 Office, Chief Information Officer/G-6 SAIS-CB AUG 11 2014 MEMORANDUM FOR SEE DISTRIBUTION 1. References.

More information

This revision replaces AF Form 40A with AF Form 1289 in Attachment 3. A bar ( ) indicates a revision from the previous version.

This revision replaces AF Form 40A with AF Form 1289 in Attachment 3. A bar ( ) indicates a revision from the previous version. BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 36-8002 1 JULY 1998 Personnel TELECOMMUTING GUIDELINES FOR AIR FORCE RESERVISTS AND THEIR SUPERVISORS COMPLIANCE WITH THIS PUBLICATION IS

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SUPERINTENDENT HQ UNITED STATES AIR FORCE ACADEMY INSTRUCTION 47-101 28 JANUARY 2016 Dental Services BASE DENTAL SERVICES COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Department of Defense

Department of Defense OFFICE 0 F THE INSPECTOR GENERAL RECONCILIATION OF AIR FORCE COMMON PAY AND PERSONNEL DATA FOR CIVILIANS February 26, 1996 Department of Defense Additional Copies To obtain additional copies of this audit

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 44-159 1 AUGUST 2000 Medical DEMAND REDUCTION PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY NOTICE: This publication is available

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 90-901 1 APRIL 2000 Command Policy OPERATIONAL RISK MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY NOTICE: This publication is

More information

Information Technology

Information Technology May 7, 2002 Information Technology Defense Hotline Allegations on the Procurement of a Facilities Maintenance Management System (D-2002-086) Department of Defense Office of the Inspector General Quality

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-322 4 JUNE 2012 Communications and Information RECORDS MANAGEMENT PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER AIR FORCE AUDIT AGENCY AIR FORCE AUDIT AGENCY INSTRUCTION 65-102 8 MAY 2012 Financial Management CENTRALLY DIRECTED AUDITS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

April 19, 2006. Human Capital. DoD Security Clearance Process at Requesting Activities (D-2006-077) Department of Defense Office of Inspector General

April 19, 2006. Human Capital. DoD Security Clearance Process at Requesting Activities (D-2006-077) Department of Defense Office of Inspector General April 19, 2006 Human Capital DoD Security Clearance Process at Requesting Activities (D-2006-077) Department of Defense Office of Inspector General Quality Integrity Accountability Additional Copies To

More information

The Cost and Economic Analysis Program

The Cost and Economic Analysis Program Army Regulation 11 18 Army Programs The Cost and Economic Analysis Program Headquarters Department of the Army Washington, DC 19 August 2014 UNCLASSIFIED SUMMARY of CHANGE AR 11 18 The Cost and Economic

More information

Information Technology

Information Technology September 11, 2002 Information Technology The Defense Advanced Research Projects Agency s Transition of Advanced Information Technology Programs (D-2002-146) Department of Defense Office of the Inspector

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER AIR COMBAT COMMAND AIR FORCE INSTRUCTION 21-103 AIR COMBAT COMMAND Supplement ADDENDUM_R 17 JULY 2013 Current 28 August 2015 Maintenance MISSION STATUS REPORTING TOOL (MSRT),

More information

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DA&M 01, entitled Civil

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DA&M 01, entitled Civil This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02770, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

How To Check If Nasa Can Protect Itself From Hackers

How To Check If Nasa Can Protect Itself From Hackers SEPTEMBER 16, 2010 AUDIT REPORT OFFICE OF AUDITS REVIEW OF NASA S MANAGEMENT AND OVERSIGHT OF ITS INFORMATION TECHNOLOGY SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED

Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major

More information

Report No. D-2008-047 February 5, 2008. Contingency Planning for DoD Mission-Critical Information Systems

Report No. D-2008-047 February 5, 2008. Contingency Planning for DoD Mission-Critical Information Systems Report No. D-2008-047 February 5, 2008 Contingency Planning for DoD Mission-Critical Information Systems Additional Copies To obtain additional copies of this report, visit the Web site of the Department

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 24-3 9 OCTOBER 2013 Transportation MANAGEMENT, OPERATION AND USE OF TRANSPORTATION VEHICLES COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

Information System Security

Information System Security October 11, 2002 Information System Security Security Controls for the Defense Procurement Payment System (D-2003-009) Department of Defense Office of the Inspector General Quality Integrity Accountability

More information

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12 Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General

More information

U.S. Air Force Active Directory and Exchange Migration

U.S. Air Force Active Directory and Exchange Migration U.S. Air Force Active Directory and Exchange Migration A White Paper Brian Gibson John Fair www.tkcglobal.com Managing one of the largest Department of Defense Active Directory and Exchange migrations

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 33-4 17 JANUARY 2013 Communications and Information INFORMATION TECHNOLOGY GOVERNANCE COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER AIR FORCE SPECIAL OPERATIONS COMMAND (AFSOC) AIR FORCE INSTRUCTION 33-114 AIR FORCE SPECIAL OPERATIONS COMMAND Supplement 16 OCTOBER 2008 Incorporating Change 1, 23 November 2011

More information

Physical Access Control System

Physical Access Control System for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)

More information

Office of Inspector General

Office of Inspector General Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases

More information

AFA Salutes 2015 Outstanding Airmen of the Year

AFA Salutes 2015 Outstanding Airmen of the Year FOR IMMEDIATE RELEASE August 13, 2015 AFA Salutes 2015 Outstanding Airmen of the Year Arlington, Va. Each year, the Air Force Association and the United States Air Force honor and recognize outstanding

More information

DODIG-2013-105 July 18, 2013. Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets

DODIG-2013-105 July 18, 2013. Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets DODIG-2013-105 July 18, 2013 Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets Additional Copies To obtain additional copies of this

More information

Report No. D-2009-089 June 18, 2009. Internal Controls Over Government Property in the Possession of Contractors at Two Army Locations

Report No. D-2009-089 June 18, 2009. Internal Controls Over Government Property in the Possession of Contractors at Two Army Locations Report No. D-2009-089 June 18, 2009 Internal Controls Over Government Property in the Possession of Contractors at Two Army Locations Additional Information and Copies To obtain additional copies of this

More information

Air Force Fitness Management System II (AFFMS II) User s Guide 18 March 2015

Air Force Fitness Management System II (AFFMS II) User s Guide 18 March 2015 Air Force Fitness Management System II (AFFMS II) User s Guide 18 March 2015 Program Manager Information HQ AFMS/SGPP Technical Support Information HQ AFPC/DPSIMC dpsimc.orgbox@randolph.af.mil Distribution

More information

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 36-3108 31 AUGUST 2011 Personnel MEMORIALIZATION PROGRAM AND CEREMONIES COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Funding Invoices to Expedite the Closure of Contracts Before Transitioning to a New DoD Payment System (D-2002-076)

Funding Invoices to Expedite the Closure of Contracts Before Transitioning to a New DoD Payment System (D-2002-076) March 29, 2002 Financial Management Funding Invoices to Expedite the Closure of Contracts Before Transitioning to a New DoD Payment System (D-2002-076) Department of Defense Office of the Inspector General

More information

Audit of the Transfer of DoD Service Treatment Records to the Department of Veterans Affairs

Audit of the Transfer of DoD Service Treatment Records to the Department of Veterans Affairs Inspector General U.S. Department of Defense Report No. DODIG-2014-097 JULY 31, 2014 Audit of the Transfer of DoD Service Treatment Records to the Department of Veterans Affairs INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 34-104 8 MARCH 2012 Services SERVICES MARKETING AND PUBLICITY PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Allegations of the Defense Contract Management Agency s Performance in Administrating Selected Weapon Systems Contracts (D-2004-054)

Allegations of the Defense Contract Management Agency s Performance in Administrating Selected Weapon Systems Contracts (D-2004-054) February 23, 2004 Acquisition Allegations of the Defense Contract Management Agency s Performance in Administrating Selected Weapon Systems Contracts (D-2004-054) This special version of the report has

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 90-801 4 AUGUST 2016 Special Management ENVIRONMENT, SAFETY, AND OCCUPATIONAL HEALTH COUNCILS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

CASE MATTER MANAGEMENT TRACKING SYSTEM

CASE MATTER MANAGEMENT TRACKING SYSTEM for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR

More information

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU) Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)

More information

AUDIT REPORT. Materials System Inventory Management Practices at Washington River Protection Solutions

AUDIT REPORT. Materials System Inventory Management Practices at Washington River Protection Solutions U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Materials System Inventory Management Practices at Washington River Protection Solutions OAS-M-15-01

More information

Acquisition. Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) October 3, 2002

Acquisition. Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) October 3, 2002 October 3, 2002 Acquisition Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) Department of Defense Office of the Inspector General Quality Integrity Accountability Report Documentation

More information

SMITHSONIAN INSTITUTION

SMITHSONIAN INSTITUTION SMITHSONIAN INSTITUTION FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 2012 INDEPENDENT EVALUATION REPORT TABLE OF CONTENTS PURPOSE 1 BACKGROUND 1 OBJECTIVES, SCOPE, AND METHODOLOGY 2 SUMMARY OF RESULTS

More information

Review of the SEC s Systems Certification and Accreditation Process

Review of the SEC s Systems Certification and Accreditation Process Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy

More information

Compliance Risk Management IT Governance Assurance

Compliance Risk Management IT Governance Assurance Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems

More information

Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security

Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security Federal Communications Commission Office of Inspector General FY 2003 Follow-up on the Audit of Web Presence Security Audit Report No. 03-AUD-09-21 October 20, 2004 TABLE OF CONTENTS Page EXECUTIVE SUMMARY

More information

Air Force Officials Did Not Consistently Comply With Requirements for Assessing Contractor Performance

Air Force Officials Did Not Consistently Comply With Requirements for Assessing Contractor Performance Inspector General U.S. Department of Defense Report No. DODIG-2016-043 JANUARY 29, 2016 Air Force Officials Did Not Consistently Comply With Requirements for Assessing Contractor Performance INTEGRITY

More information

The U.S. Coast Guard Travel to Obtain Health Care Program Needs Improved Policies and Better Oversight

The U.S. Coast Guard Travel to Obtain Health Care Program Needs Improved Policies and Better Oversight The U.S. Coast Guard Travel to Obtain Health Care Program Needs Improved Policies and Better Oversight February 9, 2015 OIG-15-31 HIGHLIGHTS The U.S. Coast Guard Travel to Obtain Health Care Program Needs

More information

DoD Methodologies to Identify Improper Payments in the Military Health Benefits and Commercial Pay Programs Need Improvement

DoD Methodologies to Identify Improper Payments in the Military Health Benefits and Commercial Pay Programs Need Improvement Report No. DODIG-2015-068 I nspec tor Ge ne ral U.S. Department of Defense JA N UA RY 1 4, 2 0 1 5 DoD Methodologies to Identify Improper Payments in the Military Health Benefits and Commercial Pay Programs

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Template modified: 27 May 1997 14:30 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 46-101 25 JULY 1994 Nursing NURSING OPERATIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY NOTICE:

More information

SUMMARY: The National Guard Bureau proposes to add a new system. of records, INGB 005, entitled Special Investigation Reports

SUMMARY: The National Guard Bureau proposes to add a new system. of records, INGB 005, entitled Special Investigation Reports This document is scheduled to be published in the Federal Register on 01/27/2016 and available online at http://federalregister.gov/a/2016-01517, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 32-1024 14 JULY 2011 Incorporating Change 2, 3 December 2015 COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Civil Engineering STANDARD FACILITY

More information

Report No. D-2009-116 September 29, 2009. Financial Management of International Military Education and Training Funds

Report No. D-2009-116 September 29, 2009. Financial Management of International Military Education and Training Funds Report No. D-2009-116 September 29, 2009 Financial Management of International Military Education and Training Funds Additional Information and Copies To obtain additional copies of this report, visit

More information

Delinquent Medical Service Accounts at Landstuhl Regional Medical Center Need Additional Management Oversight

Delinquent Medical Service Accounts at Landstuhl Regional Medical Center Need Additional Management Oversight Inspector General U.S. Department of Defense Report No. DODIG-2016-079 APRIL 28, 2016 Delinquent Medical Service Accounts at Landstuhl Regional Medical Center Need Additional Management Oversight INTEGRITY

More information

PERFORMANCE WORK STATEMENT. for. United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA)

PERFORMANCE WORK STATEMENT. for. United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA) PERFORMANCE WORK STATEMENT for United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA) Communications Directorate (A6) Task Management Tool (TMT) Support 1 TABLE OF CONTENTS Contract Number

More information

Office of the Inspector General Department of Defense

Office of the Inspector General Department of Defense INFORMATION ASSURANCE OF THE DEFENSE CIVILIAN PERSONNEL DATA SYSTEM - NAVY Report Number 98-127 April 29 1998 Office of the Inspector General Department of Defense Additional Information and Copies To

More information

MICHIGAN AUDIT REPORT PERFORMANCE AUDIT OF THE QUALIFIED VOTER FILE AND DIGITAL DRIVER'S LICENSE SYSTEMS

MICHIGAN AUDIT REPORT PERFORMANCE AUDIT OF THE QUALIFIED VOTER FILE AND DIGITAL DRIVER'S LICENSE SYSTEMS MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE QUALIFIED VOTER FILE AND DIGITAL DRIVER'S LICENSE SYSTEMS DEPARTMENT OF STATE AND DEPARTMENT OF INFORMATION TECHNOLOGY March

More information

Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling

Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION

More information

ATTACHMENT V5 AIR FORCE TRANSPORTATION ACCOUNT CODES (TACS)

ATTACHMENT V5 AIR FORCE TRANSPORTATION ACCOUNT CODES (TACS) A. GENERAL ATTACHMENT V5 AIR FORCE TRANSPORTATION ACCOUNT CODES (TACS) 1. This attachment provides guidance pertaining to the assignment of Air Force TACs for movement of Air Force sponsored cargo. Guidance

More information

An Unreliable Chart of Accounts Affected Auditability of Defense Enterprise Accounting and Management System Financial Data

An Unreliable Chart of Accounts Affected Auditability of Defense Enterprise Accounting and Management System Financial Data Report No. DODIG-2012-140 September 28, 2012 An Unreliable Chart of Accounts Affected Auditability of Defense Enterprise Accounting and Management System Financial Data Additional Copies To obtain additional

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. Section A Camouflage, Concealment, and Deception (CCD) Program

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. Section A Camouflage, Concealment, and Deception (CCD) Program Template modified: 27 May 1997 14:30 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 32-4007 7 MARCH 1994 Civil Engineering CAMOUFLAGE, CONCEALMENT, AND DECEPTION COMPLIANCE WITH THIS

More information

Report No. D-2011-6-008

Report No. D-2011-6-008 Hotline Review June 28, 2011 Hotline Complaint Regarding a Defense Contract Audit Agency Employee Conducting Private For-Profit Tax Business Activity on Government Time and Using Government Equipment Report

More information

The Army s Information Technology Contracts Awarded Without Competition Were Generally Justified

The Army s Information Technology Contracts Awarded Without Competition Were Generally Justified Inspector General U.S. Department of Defense Report No. DODIG 2015 096 MARCH 25, 2015 The Army s Information Technology Contracts Awarded Without Competition Were Generally Justified INTEGRITY EFFICIENCY

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER AIR FORCE MATERIEL COMMAND AIR FORCE MATERIEL COMMAND INSTRUCTION 10-205 16 APRIL 2014 Operations EMERGENCY NOTIFICATION, ALERT AND RECALL COMPLIANCE WITH THIS PUBLICATION IS

More information

Frequently Asked Questions About Using The GRE Search Service

Frequently Asked Questions About Using The GRE Search Service Frequently Asked Questions About Using The GRE Search Service General Information Who can use the GRE Search Service? Institutions eligible to participate in the GRE Search Service include (1) institutions

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

valuation eport INFORMATION ASSURANCE AT CENTRAL DESIGN ACTIVITIES Report No. D-2001-046 February 7, 2001

valuation eport INFORMATION ASSURANCE AT CENTRAL DESIGN ACTIVITIES Report No. D-2001-046 February 7, 2001 valuation eport INFORMATION ASSURANCE AT CENTRAL DESIGN ACTIVITIES Report No. D-2001-046 February 7, 2001 Office of the Inspector General Department of Defense Form SF298 Citation Data Report Date ("DD

More information

AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks

AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks

More information

Defense Acquisition Review Journal

Defense Acquisition Review Journal 170 Image designed by TSgt James Smith, USAF, and SPC Kelly Lowery, USA automatic test systems: unique vs. common-core management automatic Automatic test Test systems: Systems: Unique vs. common-core

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-129 3 FEBRUARY 2005 Incorporating Through Change 3, 12 SEPTEMBER 2009 Communications and Information WEB MANAGEMENT AND INTERNET USE

More information

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented

More information

Information Security Series: Security Practices. Integrated Contract Management System

Information Security Series: Security Practices. Integrated Contract Management System OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Information Security Series: Security Practices Integrated Contract Management System Report No. 2006-P-00010 January 31,

More information

PERFORMANCE WORK STATEMENT (PWS) 3 Aug 15 EXECUTIVE SUMMARY FOR AFAEMS / AFVEC / AI PORTAL HELPDESK SUPPORT AIR FORCE ACQUSITION TRAINING OFFICE

PERFORMANCE WORK STATEMENT (PWS) 3 Aug 15 EXECUTIVE SUMMARY FOR AFAEMS / AFVEC / AI PORTAL HELPDESK SUPPORT AIR FORCE ACQUSITION TRAINING OFFICE PERFORMANCE WORK STATEMENT (PWS) FOR AFAEMS / AFVEC / AI PORTAL HELPDESK SUPPORT 3 Aug 15 Name: Organization: AIR FORCE ACQUSITION TRAINING OFFICE SAF/AQH-ATO Address: 555 E STREET WEST, JBSA RANDOLPH,

More information

This publication is available digitally on the AFDPO WWW site at: http://www.e-publishing.af.mil.

This publication is available digitally on the AFDPO WWW site at: http://www.e-publishing.af.mil. BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 16-107 2 FEBRUARY 2006 Certified Current, 23 April 2010 Operations Support MILITARY PERSONNEL EXCHANGE PROGRAM (MPEP) COMPLIANCE WITH THIS

More information

OAIG-AUD (ATTN: AFTS Audit Suggestions) Inspector General, Department of Defense 400 Army Navy Drive (Room 801) Arlington, VA 22202-2884

OAIG-AUD (ATTN: AFTS Audit Suggestions) Inspector General, Department of Defense 400 Army Navy Drive (Room 801) Arlington, VA 22202-2884 Additional Copies To obtain additional copies of this report, contact the Secondary Reports Distribution Unit of the Audit Followup and Technical Support Directorate at (703) 604-8937 (DSN 664-8937) or

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE Air Force Instruction 51-302 5 NOVEMBER 2014 LAW MEDICAL LAW COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications and forms are available

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the SAF/FM Customer Relationship Management/CRM SAF/FM CRM 1.1 SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic

More information

How To Rate Plan On A Credit Card With A Credit Union

How To Rate Plan On A Credit Card With A Credit Union Rate History Contact: 1 (800) 331-1538 Form * ** Date Date Name 1 NH94 I D 9/14/1998 N/A N/A N/A 35.00% 20.00% 1/25/2006 3/27/2006 8/20/2006 2 LTC94P I F 9/14/1998 N/A N/A N/A 35.00% 20.00% 1/25/2006 3/27/2006

More information

AUDIT OF SBA S COMPLIANCE WITH JOINT FINANCIAL MANAGEMENT IMPROVEMENT PROGRAM PROPERTY MANAGEMENT SYSTEM REQUIREMENTS AUDIT REPORT NUMBER 3-34

AUDIT OF SBA S COMPLIANCE WITH JOINT FINANCIAL MANAGEMENT IMPROVEMENT PROGRAM PROPERTY MANAGEMENT SYSTEM REQUIREMENTS AUDIT REPORT NUMBER 3-34 AUDIT OF SBA S COMPLIANCE WITH JOINT FINANCIAL MANAGEMENT IMPROVEMENT PROGRAM PROPERTY MANAGEMENT SYSTEM REQUIREMENTS AUDIT REPORT NUMBER 3-34 JULY 23, 2003 This report may contain proprietary information

More information

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2

More information