Department of Defense
|
|
|
- Sybil Gaines
- 10 years ago
- Views:
Transcription
1 Department of Defense DIRECTIVE NUMBER April 14, 2004 Certified Current as of April 23, 2007 ASD(NII) SUBJECT: Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG) References: (a) DoD Directive , "Global Information Grid (GIG) Overarching Policy," September 19, 2002 (b) Director of Central Intelligence Directive 6/9, "Physical Security Standards for Sensitive Compartmented Information Facilities," November 18, (c) Director of Central Intelligence Directive 6/3, "Protecting Sensitive Compartmented Information within Information Systems," June 5, (d) DoD Directive E, "Information Assurance (IA)," October 24, 2002 (e) through (m), see enclosure 1 1. PURPOSE This Directive: 1.1. Establishes policy and assigns responsibilities for the use of commercial wireless devices, services, and technologies in the DoD Global Information Grid (GIG) (reference (a)). Hereafter, the term "wireless" means commercial wireless devices, services, and technologies Directs the development and use of a Knowledge Management (KM) process to promote the sharing of wireless technology capabilities, vulnerabilities, and vulnerability mitigation strategies throughout the Department of Defense Promotes joint interoperability using open standards throughout the Department of Defense for commercial wireless services, devices, and technological implementations. 1 Limited Distribution. Contact the Office of the Intelligence Community Chief Information Officer.
2 2. APPLICABILITY AND SCOPE This Directive: 2.1. Applies to the Office of the Secretary of Defense, the Military Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities in the Department of Defense (hereafter referred to collectively as "the DoD Components") Applies to all DoD personnel, contractors, and visitors that enter DoD facilities or that have access to DoD information Applies to all commercial wireless devices, services, and technologies, including voice and data capabilities, that operate either as part of the DoD GIG, or as part of DoD non-gig Information Technology (IT) (stand-alone) systems. This includes, but is not limited to: commercial wireless networks and Portable Electronic Devices (PED) such as laptop computers with wireless capability, cellular/personal Communications System (PCS) devices, audio/video recording devices, scanning devices, remote sensors, messaging devices, Personal Digital Assistants (PDA), and any other commercial wireless devices capable of storing, processing, or transmitting information Does not apply to Information Systems (IS) and/or Sensitive Compartmented Information Facilities (SCIF) to which Director of Central Intelligence Directive (DCID) 6/9 (reference (b)) and DCID 6/3 (reference (c)) apply; i.e., Sensitive Compartmented Information (SCI) and special access programs for intelligence under the purview of the Director of Central Intelligence Does not apply to receive-only pagers, Global Positioning System receivers, hearing aids, pacemakers, other implanted medical devices, or personal life support systems. The detection segment of a PED (e.g., the laser used in optical storage media; between a barcode and a scanner head; or Radio Frequency (RF) energy between RF identification tags, both active and passive, and the reader/interrogator) does not require encryption. 3. DEFINITIONS Terms used in this Directive are defined in enclosure POLICY It is DoD policy that: 2
3 4.1. Wireless devices, services, and technologies that are integrated or connected to DoD networks are considered part of those networks, and must comply with DoD Directive E (reference (d)) and DoD Instruction (reference (e)) and be certified and accredited in accordance with DoD Instruction (reference (f)). In addition: For data, strong authentication, non-repudiation, and personal identification is required for access to a DoD IS in accordance with published DoD policy and procedures. Identification and Authentication (I&A) measures shall be implemented at both the device and network level. I&A of unclassified voice is desirable; voice packets across an Internet protocol (e.g., Voice over Internet Protocol (VoIP)) shall implement I&A in accordance with published DoD policy and procedures Encryption of unclassified data for transmission to and from wireless devices is required. Exceptions may be granted on a case-by-case basis as determined by the Designated Approving Authority (DAA) for the wireless connections under their control. At a minimum, data encryption must be implemented end-to-end over an assured channel and shall be validated under the Cryptographic Module Validation Program as meeting requirements per Federal Information Processing Standards (FIPS) Publication (PUB) 140-2, Overall Level 1 or Level 2, as dictated by the sensitivity of the data (reference (g)) Encrypting unclassified voice is desirable; voice packets across an Internet protocol (e.g., VoIP) shall use encryption that is validated as meeting FIPS requirements For data at rest, PEDs shall use file encryption that is validated as meeting FIPS requirements. Individual exceptions may be granted on a case-by-case basis as determined by the DAA Wireless devices shall not be used for storing, processing, or transmitting classified information without explicit written approval of the cognizant DAA. If approved by the DAA, only assured channels employing National Security Agency (NSA)-approved encryption shall be used to transmit classified information. Classified data stored on PEDs must be encrypted using NSA-approved encryption consistent with storage and treatment of classified information Measures shall be taken to mitigate denial of service attacks. These measures shall address not only external threats, but potential interference from friendly sources Introduction of wireless technologies in DoD ISs, including those creating an external interface to non-dod systems (or allowing use of DoD wireless devices on non-dod wireless networks) can have a significant adverse effect on the security posture of the IS and requires security review and documentation in accordance with reference (d). 3
4 4.2. Cellular/PCS and/or other RF or Infrared (IR) wireless devices shall not be allowed into an area where classified information is discussed or processed without written approval from the DAA in consultation with the Cognizant Security Authority (CSA) Certified TEMPEST Technical Authority (CTTA) Wireless technologies/devices used for storing, processing, and/or transmitting information shall not be operated in areas where classified information is electronically stored, processed, or transmitted unless approved by the DAA in consultation with the CSA CTTA. The responsible CTTA shall evaluate the equipment using risk management principles and determine the appropriate minimum separation distances and countermeasures Pursuant to subparagraph , DAAs shall ensure that Wireless Personal Area Network (WPAN) capability is removed or physically disabled from a device unless FIPS PUB validated cryptographic modules are implemented (reference (g)). Exceptions may be granted on a case-by-case basis as determined by the DAA The DoD Components shall actively screen for wireless devices. Active electromagnetic sensing at the DoD or contractor premises to detect/prevent unauthorized access of DoD ISs shall be periodically performed by the cognizant DAA or Defense Security Service office to ensure compliance with the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ongoing accreditation agreement (reference (f)) Mobile code shall not be downloaded from non-dod sources. Downloading of mobile code shall only be allowed from trusted DoD sources over assured channels PEDs that are connected directly to a DoD-wired network (e.g., via a hot synch connection to a workstation) shall not be permitted to operate wirelessly while directly connected Anti-virus software shall be used on wireless-capable PEDs and workstations that are used to synchronize/transmit data, in accordance with reference (e). The network infrastructure shall update anti-virus software for all applicable PEDs and their supporting desktops from a site maintained by the Defense Information Systems Agency The DoD Components shall seek and follow spectrum supportability guidance from the Military Communications-Electronics Board (MCEB) prior to assuming any contractual obligations for the full-scale development, production, procurement, or deployment of spectrum dependent (i.e., wireless) devices or systems, in accordance with DoD Directive (reference (h)) A DoD wireless KM process shall be established. The goal is increased sharing of DoD wireless expertise to include information on vulnerability assessments, best practices, and procedures for wireless device configurations and connections. 4
5 The KM process shall be utilized by DAAs to help determine acceptable uses of wireless devices and employ appropriate mitigating actions DAAs shall submit alternative mitigating techniques for inclusion in the KM database. The DoD Components shall use the KM process to coordinate, prioritize, and avoid duplication of vulnerability assessments of wireless devices Information on vulnerability assessments shall be considered for classification in accordance with DoD R (reference (i)) and handled appropriate to that classification. 5. RESPONSIBILITIES 5.1. The Assistant Secretary of Defense for Networks and Information Integration, as the DoD Chief Information Officer, shall: Monitor and provide oversight and policy development of all DoD wireless activities Establish a formal coordination process with the Intelligence Community (IC) Chief Information Officer (CIO) to ensure proper protection of IC information in implementing this Directive Ensure information interoperability of wireless capabilities in support of joint operations in accordance with DoD Directive and DoD Instruction (references (j) and (k)) Direct the development of acquisition strategies and assess potential architectures (e.g., wireless application frameworks) to minimize costs of wireless development, services and systems, achieve economies of scale, and promote interoperability and security. As necessary, coordinate these activities with the Under Secretary of Defense for Acquisition, Technology, and Logistics Direct the development and implementation of a DoD wireless KM process to promote increased sharing of DoD wireless information Evaluate and approve specific implementation timelines for compliance of legacy systems to this Directive Ensure that the Director, Defense Information Systems Agency, shall: Incorporate wireless considerations in its DoD-wide Information Assurance (IA) initiatives such as computer emergency response, vulnerability alerting, and enterprise anti-virus and file/data store encryption software. 5
6 Provide analytical and standards support to the DoD Components concerning proper employment of wireless devices Provide interoperability testing for wireless devices and operational support for spectrum deconfliction and interference resolution Ensure that wireless capabilities are appropriately integrated into the Defense Information Systems Network Promote research and development of spectrum-efficient technologies The Under Secretary of Defense for Intelligence shall: Ensure that the Director, Defense Intelligence Agency, provides intelligence support and guidance on the use of wireless technologies for Defense Intelligence Agencyaccredited SCIFs Ensure that the Director, Defense Security Service, includes monitoring and assessment of wireless IS security practices while conducting regular inspections of DoD contractors processing classified information in accordance with DoD M (reference (l)) Ensure that the Director, National Security Agency shall: Implement a capability to assess the risks and vulnerabilities associated with wireless technologies that are responsive to DoD requirements Develop and disseminate threat information regarding the capabilities and intentions of adversaries to exploit wireless technologies used by the DoD Components Serve as the DoD focal point for IA wireless technologies research and development in support of IA requirements to include protection mechanisms, detection and monitoring, response and recovery, and IA assessment tools and techniques. As necessary, coordinate these activities with the Director, Defense Research and Engineering The OSD Principal Staff Assistants shall: Ensure end-to-end protection and joint interoperability in their functional areas by guiding investments and other actions relating to wireless technologies Ensure wireless requirements for ISs and functional applications developed under their cognizance are fully coordinated at the DoD cross-component level. 6
7 5.4. The Chairman of the Joint Chiefs of Staff shall: Develop, coordinate, and promulgate wireless policies and procedures applicable to Joint operations Review, confirm, and certify the security and sufficiency of wireless-related interoperability requirements for ISs using wireless capabilities supporting Joint operations Ensure the appropriate review and confirmation of the sufficiency of wirelessrelated interoperability key performance parameters and information exchange requirements for all capstone requirements documents and operational requirements documents The Commander, U.S. Strategic Command, shall develop defensive actions necessary to detect, deter, or defeat unauthorized wireless activity up to and including computer network attacks against DoD computer networks and to minimize impact from such activities The Heads of the DoD Components shall: Submit to the DoD CIO, within 180 days of this Directive, specific implementation timelines for compliance of legacy systems to this Directive Ensure that all new commercial wireless procurements comply with this Directive immediately. Ensure all entities within their organization and/or under their control that are involved in acquiring (e.g., either developing or procuring) spectrum-dependent (i.e., wireless) systems: Seek and conform to guidance from the MCEB concerning the licensing and use of wireless systems Comply with the evaluation and validation requirements of enclosure 3 of reference (e) Ensure use of the wireless KM process when evaluating potential wireless solutions Ensure that activities evaluating wireless technology provide feedback to the wireless KM process concerning strengths, weaknesses, vulnerabilities, mitigation techniques, and related security procedures Ensure that DAAs, in accordance with reference (f): Control wireless access to ISs under their cognizance to ensure that the wireless systems (including external interfaces to commercial wireless services) do not introduce wireless vulnerabilities that undermine the assurance of the other interconnected systems. 7
8 Include intrusion detection methodologies for the wireless systems Incorporate wireless topics into annual IA training Review risk assessment results to make an informed and affirmative decision about the risk before granting an exception to this policy. 6. EFFECTIVE DATE This Directive is effective immediately. Enclosures - 2 E1. References, continued E2. Definitions 8
9 E1. ENCLOSURE 1 REFERENCES, continued (e) DoD Instruction , "Information Assurance (IA) Implementation," February 6, 2003 (f) DoD Instruction , "DoD Information Technology Security Certification and Accreditation Process (DITSCAP)," December 30, 1997 (supplemented by DoD M, "Application Manual," July 2000) (g) Federal Information Processing Standard (FIPS) 140-2, May 25, (h) DoD Directive , "Policy for Management and Use of Electromagnetic Spectrum," June 6, 2004 (i) DoD R, "Information Security Program," January 1997 (j) DoD Directive , "Interoperability and Supportability of Information Technology and National Security Systems (NSS)," May 5, 2004 (k) DoD Instruction , "Procedures for Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)," June 30, 2004 (l) DoD M, "National Industry Security Program Operating Manual," February 28, 2006 (m) Section 11103(a) of title 40, United States Code 2 Available via internet at 9 ENCLOSURE 1
10 E2. ENCLOSURE 2 DEFINITIONS E Assured Channel. A network communication link that is protected by a security protocol providing authentication, confidentiality, and data integrity, and employs U.S. Government-approved cryptographic technologies whenever cryptographic means are utilized. The following protocols and mechanisms are sufficient to meet the requirements for an assured channel carrying unclassified data: Internet Protocol Security, Secure Sockets Layer v3, Transport Layer Security, and Secure Multipurpose Internet Mail Extension. Assured channels for classified data must use an NSA-approved protection mechanism commensurate with the classification level of the data. E Authentication. Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. E Commercial Wireless. Devices, Services, and Technologies commercially procured and intended for use in commercial frequency bands. E Certified TEMPEST Technical Authority (CTTA). An experienced, technically qualified U.S. Government employee who has met established certification requirements in accordance with Committee on National Security Systems-approved criteria and has been appointed by a U.S. Government Department or Agency to fulfill CTTA responsibilities. E Designated Approving Authority (DAA). The official authorized to formally assume responsibility for operating a system at an acceptable level of risk. This term is synonymous with Designated Accrediting Authority and Delegated Accrediting Authority. E DoD Information Technology Security Certification and Accreditation Process (DITSCAP). The standard DoD approach for identifying information security requirements, providing security solutions, and managing information technology system security. E End-to-End. IS from the end-user device up to the security border of a DoD network and/or between two user devices connected by a DoD/non-DoD network (to include the wireless infrastructures air interface). E External Interfaces. Interfaces, including commercial systems (such as a cellular/pcs or pager network not under control of the DAA), capable of carrying traffic between systems under control of the DAA (e.g., the DoD IS and a DoD wireless device). 10 ENCLOSURE 2
11 E Federal Information Processing Standards (FIPS). The standards issued by the National Institute of Standards and Technology for Federal computer systems ( E Global Information Grid (GIG). The globally interconnected, end-to-end set of information capabilities associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes all owned and leased communications and computing systems and services, software (including applications), data, security services, and other associated services necessary to achieve Information Superiority. It also includes National Security Systems as defined in 40 U.S.C (a) (formerly section 5142 of the Clinger-Cohen Act of 1996) (reference (m)). E Includes any system, equipment, software, or service that meets one or more of the following criteria: E Transmits information to, receives information from, routes information among, or interchanges information among other equipment, software, and services. E Provides retention, organization, visualization, information assurance, or disposition of data, information, and/or knowledge received from or transmitted to other equipment, software, and services. E Processes data or information for use by other equipment, software, and services. E Non-GIG IT -- Stand-alone, self-contained, or embedded IT that is not or shall not be connected to the enterprise network. E Heads of the DoD Components. For purposes of this policy guidance, the Heads of the DoD Components include: the Office of the Secretary of Defense Principal Staff Assistants, the Secretaries of the Military Departments, the Chairman of the Joint Chiefs of Staff, the Commanders of the Combatant Commands, the Directors of the Defense Agencies and DoD Field Activities, and the Inspector General of the Department of Defense, and all other organizational entities in the Department of Defense. E Identification & Authentication (I&A). Process of accepting a claimed identity and establishing the validity of that claimed identity. E Information Assurance (IA). Measures used to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. 11 ENCLOSURE 2
12 E Information System (IS). The entire infrastructure, organization, personnel, and components used to collect, process, store, transmit, display, disseminate, and dispose of information. E Information Technology (IT). Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the Executive Agency. This includes equipment used by a DoD Component directly or used by a contractor under a contract with the DoD Component that: E Requires the use of such equipment; or E Requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The term also includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources. Notwithstanding the above, the term does not include any equipment that is acquired by a Federal contractor incidental to a Federal contract (reference (a)). E Mobile Code. Software modules obtained from remote systems, transferred across a network, and then downloaded and executed on local systems without explicit installation or execution by the recipient. E Personal Digital Assistant (PDA). A generic term for a class of small, easily carried electronic devices used to store and retrieve information. E Portable Electronic Device (PED). Any non-stationary electronic apparatus with the capability of recording, storing, and/or transmitting information. This definition includes, but is not limited to PDAs, cellular/pcs phones, two-way pagers, e- mail devices, audio/video recording devices, and hand-held/laptop computers. E Sensitive Compartmented Information (SCI). Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. E Spectrum Supportability. The assessment as to whether the electromagnetic spectrum necessary to support the operation of spectrum-dependent equipment or a spectrum-dependent system during its expected life cycle is, or will be, available (that is, from system development, through development and operational testing, to actual operation in the electromagnetic environment). The assessment of "spectrum supportability" is based upon, at a minimum, receipt of equipment spectrum certification, reasonable assurance of the availability of sufficient frequencies for operation, and consideration of electromagnetic compatibility (EMC). 12 ENCLOSURE 2
13 E Synchronize. The process of communicating with a host or another PED to upload, download, merge, or swap information (Hot-Synch). E Wireless. Technology that permits the active transfer of information involving emanation of energy between separated points without physical connection. Currently wireless technologies use IR, acoustic, RF, and optical but, as technology evolves, wireless could include other methods of transmission. E Wireless Personal Area Network (WPAN). A system that provides electromagnetic communication connectivity over a few yards. Currently it uses either RF (e.g., Bluetooth) or IR technology. 13 ENCLOSURE 2
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)
Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.40 December 30, 1997 SUBJECT: DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ASD(C3I) References: (a) DoD Directive
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8523.01 April 22, 2008 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) References: (a) DoD Directive C-5200.5, Communications Security (COMSEC) (U),
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities Wireless Infrastructure, Article 12-29-2011 The federal government, and the Department of
Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
NOV. 2 2 2q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000 CHIEF INFORMATION OFFICER NOV 2 2 2q11 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF
Interim Department of Defense (DoD) Certification and Accreditation (C&A) Process Guidance
Interim Department of Defense (DoD) Certification and Accreditation (C&A) Process Guidance SUBJECT: DoD Information Assurance Certification and Accreditation Process (DIACAP) References: (a) Section 3541
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues
Information Technology (IT) Investment Management Insight Policy for Acquisition
MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES OF DEFENSE DIRECTOR, DEFENSE RESEARCH AND ENGINEERING ASSISTANT SECRETARIES OF DEFENSE GENERAL
Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
Ohio Supercomputer Center
Ohio Supercomputer Center Security Education and Awareness No: Effective: OSC-6 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5010.40 May 30, 2013 USD(C)/CFO SUBJECT: Managers Internal Control Program Procedures References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.64 January 10, 2013 DA&M SUBJECT: Defense Contract Management Agency (DCMA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Department of Defense INSTRUCTION. Commercial Wireless Local-Area Network (WLAN) Devices, Systems, and Technologies
Department of Defense INSTRUCTION NUMBER 8420.01 November 3, 2009 ASD(NII)/DoD CIO SUBJECT: Commercial Wireless Local-Area Network (WLAN) Devices, Systems, and Technologies References: See Enclosure 1
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
UNCLASSIFIED NATIONAL POLICY ON CERTIFICATION AND ACCREDITATION OF NATIONAL SECURITY SYSTEMS UNCLASSIFIED. CNSS Policy No.
October 2005 NATIONAL POLICY ON CERTIFICATION AND ACCREDITATION OF NATIONAL SECURITY SYSTEMS Committee on National Security Systems FOREWORD 1. The national security community, in order to ensure the security
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Department of Defense INSTRUCTION. SUBJECT: Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program (IEP)
Department of Defense INSTRUCTION NUMBER 2015.4 February 7, 2002 USD(AT&L) SUBJECT: Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program (IEP) References: (a) DoD Instruction
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5400.16 February 12, 2009 ASD(NII)/DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
E-Mail Secure Gateway (EMSG)
for the E-Mail Secure Gateway (EMSG) DHS/ALL/PIA-012(b) February 25, 2013 Contact Point David Jones MGMT/OCIO/ITSO/ESDO DHS HQ (202) 447-0167 Reviewing Official Jonathan R. Cantor Acting Chief Privacy
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. NOTICE: This publication is available digitally on the AFDPO WWW site at: http://afpubs.hq.af.mil.
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-204 21 September 2001 Communications and Information INFORMATION ASSURANCE (IA) AWARENESS PROGRAM COMPLIANCE WITH THIS PUBLICATION IS
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
FAST FILE TRANSFER INFORMATION ASSURANCE ASSESSMENT REPORT
DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND INDIAN HEAD, MARYLAND FAST FILE TRANSFER INFORMATION ASSURANCE ASSESSMENT REPORT DOC NR: 5G18.013 OCTOBER 2007 FAST FILE TRANSFER
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Department of Defense INSTRUCTION. Reference: (a) DoD Directive 3020.26, Defense Continuity Programs (DCP), September 8, 2004January 9, 2009
Department of Defense INSTRUCTION SUBJECT: Defense Continuity Plan Development NUMBER 3020.42 February 17, 2006 Certified current as of April 27, 2011 Reference: (a) DoD Directive 3020.26, Defense Continuity
Defense Logistics Agency INSTRUCTION
Defense Logistics Agency INSTRUCTION DLAI 8130.01 Effective September 27, 2013 SUBJECT: Mobile Device Management REFERENCES: Refer to Enclosure 1. J6 1. PURPOSE. This instruction: a. Establishes the policy
Department of Defense DIRECTIVE. SUBJECT: Assistant Secretary of Defense for Public Affairs (ASD(PA))
Department of Defense DIRECTIVE NUMBER 5122.05 September 5, 2008 DA&M SUBJECT: Assistant Secretary of Defense for Public Affairs (ASD(PA)) References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
The DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
HHSN316201200042W 1 QSSI - Quality Software Services, Inc
ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
Information Assurance Manual
THE SECRETARY OF THE NAVY SECNAV M-5239.1 Department of the Navy Information Assurance Program Information Assurance Manual Published By The Department of the Navy Chief Information Officer DEPARTMENT
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.36 February 28, 2002 Certified Current as of November 21, 2003 SUBJECT: Defense Contract Audit Agency (DCAA) DA&M References: (a) Title 10, United States Code
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.02 May 24, 2011 ASD(NII)/DoD CIO SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling References: See Enclosure 1 1. PURPOSE. This Instruction:
Ames Consolidated Information Technology Services (A-CITS) Statement of Work
Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4151.19 January 9, 2014 USD(AT&L) SUBJECT: Serialized Item Management (SIM) for Life-Cycle Management of Materiel References: See Enclosure 1 1. PURPOSE. In accordance
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4165.71 January 6, 2005 USD(AT&L) SUBJECT: Real Property Acquisition References: (a) DoD Directive 4165.6, Real Property, October 13, 2004 (b) DoD Directive 4275.5,
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8580.02 August 12, 2015 USD(P&R) SUBJECT: Security of Individually Identifiable Health Information in DoD Health Care Programs References: See Enclosure 1 1. PURPOSE.
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Department of Defense MANUAL. Procedures for Ensuring the Accessibility of Electronic and Information Technology (E&IT) Procured by DoD Organizations
Department of Defense MANUAL NUMBER 8400.01-M June 3, 2011 ASD(NII)/DoD CIO SUBJECT: Procedures for Ensuring the Accessibility of Electronic and Information Technology (E&IT) Procured by DoD Organizations
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
