Commercial Solutions for Classified (CSfC) Customer Handbook Version 1.1
|
|
|
- Emory White
- 10 years ago
- Views:
Transcription
1 Commercial Solutions for Classified (CSfC) Customer Handbook Version 1.1
2 This page is intentionally left blank. ii
3 Table of Contents I. Introduction... 1 II. Purpose... 1 III. Audience... 1 IV. CSfC Artifacts and Location... 2 V. CSfC Process... 3 A. Customer Has an IA Requirement... 3 B. Download Capability Package and Request Risk Assessment Applicable Capability Package Available No Applicable Capability Package Available Request Risk Assessment... 4 C. Comply with CSfC Capability Package... 4 D. Register Solution... 4 E. Perform System Certification & Accreditation... 5 F. Maintenance... 5 G. Annual Re-assessment and De-registration... 5 VI. Contact Information... 6 iii
4 I. Introduction The Commercial Solutions for Classified (CSfC) process enables commercial components to be used in layered solutions to protect classified National Security Systems (NSS) information. The NSA provides architectures, component criteria, and configuration of the solution to meet an Information Assurance (IA) requirement. The CSfC process also includes the means for vendors to get their components on the CSfC Components List, making them eligible for use in a CSfC solution. II. Purpose This document serves as a guide for customers of CSfC artifacts to include Capability Packages, CSfC Components List, Registration and Life Cycle Support resources. Once a Capability Package is published to the public Internet, customers are able to download and go. But what does this actually mean? This document will explain the customer process from the time the customer believes it has a CSfC requirement to fielding and life cycle support. This document is intended to provide the process for customers to follow, identify the location and use of each CSfC artifact, and explain expectations for successful navigation through the road to approved composed solutions that protect classified information and systems. III. Audience Customers of the Capability Package are typically the U.S. Government Client who will be implementing and managing the solution. However the contents of a Capability Package may be useful to the accreditor, system integrator, and vendor/component developer. Accreditor - The Authorizing Official/Designated Approving Official (AO/DAO) uses the Capability Package to understand and facilitate the collaboration between the owners and developers and ultimately determine whether the solution provides an acceptable level of risk. System Integrator - System integrators integrate a CSfC solution per the Capability Package and customer requirements. Integration of the CSfC solution includes selection of the components of the CSfC solution from the CSfC Components List, in accordance with the restrictions in the Capability Package, and testing of the CSfC solution per the Capability Package. Integrators should ensure that the component selection and configurations provide acceptable functionality, security, and risk levels. Vendor/Component Developer - Vendors may review the Capability Package to understand how the component could be used in the architecture provided in the Capability Package. However, in order to be used within a CSfC solution a component vendor will undergo the CSfC process for use in a composed solution rather than one component vendor developing an entire CSfC solution. This follows the general tenets of independence that serves as one of the foundational components of the CSfC process. Vendors who wish to have their components eligible as CSfC components of a composed, layered IA solution must have their component evaluated per the National Information Assurance Partnership 1
5 (NIAP) process in accordance with the applicable U.S. Government Protection Profile(s), undergo the Federal Information Processing Standards validation process, and undergo interoperability testing when it is established. Additionally, the CSfC program requires a vendor to enter into a Memorandum of Agreement (MOA) with NSA. The MOA obligates the company to provide sufficient information for NSA to make a risk decision, and to cooperate with NSA to mitigate any discovered vulnerabilities that would impact the risk management posture of the CSfC solution, both initially and throughout the component s life cycle. Once a component has met the requirements, NSA will add it to the CSfC Components List so the component is eligible for use in an approved CSfC solution. These components become the building blocks for CSfC solution providers to create solutions. IV. CSfC Artifacts and Location This section provides the definition and location of unclassified CSfC artifacts. CSfC Solution Integration of multiple components from the CSfC Components List, each providing/supporting a layer of protection Compliant with applicable CSfC Capability Package Approved by NSA for the protection of classified data/systems if compliant with the CSfC Capability Package CSfC Components List List of products eligible for use as components in a CSfC solution. Available CSfC components will be located at To request that a component be considered for the CSfC Components list a vendor can download and complete a questionnaire located at CSfC Prototype Solution This is a CSfC solution developed by National Security Agency (NSA), with a partner, to acquire knowledge for incorporation into a CSfC Capability Package. CSfC prototype solutions can be approved by NSA for use by the partner for a specified period of time. The prototypes will not be located on the public website. CSfC Capability Package contains: Architecture and description of a CSfC solution Requirements for component selection, configuration, keying and testing Rules on use of CSfC solution and its life cycle support Risk assessment stating the residual risk (classified) 2
6 V. CSfC Process Customer Identifies CSFC Requirement Determine if there is an applicable CP Yes or No? No Contact Client Advocate Yes Download CP Request Risk Assessment Compare solution to CP Yes Comply with CP? No No Fix/ Revise Solution? Yes Register Solution Perform system C&A Maintain Solution Annual Reassessment De-register Solution A. Customer Has an IA Requirement The unclassified portion of the NSA approved Capability Packages are published on NSA s Internet site. Customers who have an IA requirement that can be met using a CSfC solution will need to visit the CSfC Program website ( to determine if there is an approved Capability Package that meets the requirement. The sections below address how the various customer types would use data within the Capability Package. B. Download Capability Package and Request Risk Assessment 1. Applicable Capability Package Available Customers should select the Capability Package that will best meet their needs. Customers can use the Capability Package to understand the capability that could be provided and restrictions on how it can be used. When choosing a Capability Package, keep in mind that a Capability Package is developed for a specific type of capability. 2. No Applicable Capability Package Available If there is no available Capability Package, the current Capability Package is not applicable to the solution, or the Capability Package cannot be applied in a manner that would produce a compliant solution, the client must contact the NSA Client Advocate (CA) requesting NSA support to the CSfC requirement. The customer will submit an IA requirement for development of a solution by documenting the requirement in a Requirements Scoping Questionnaire. In addition to sufficient detail in the questionnaire, the customer/client/agency must submit all relevant supporting documentation to 3
7 the Client Advocate. The CA will coordinate internally to determine if the requirement should be handled through the CSfC process or another better suited process. If the requirement is a CSfC solution, then the client will go through the CSfC prototyping phase. An acceptable prototype should present a capability with sufficient deltas from the current Capability Packages and previously approved prototypes. An approved prototype must become compliant with the Capability Package within two years, unless stated otherwise in the prototype approval letter. 3. Request Risk Assessment After downloading a Capability Package, the customer must also request a copy of the risk assessment for that Capability Package by contacting the NSA IAD Client Advocate. The Risk Assessment is a separate document that supplements the Capability Package. The risk assessment documents the threats, mitigations, and residual risks associated with CSfC solutions based on a Capability Package. It contains classified information and therefore is not included within the unclassified portion of the Capability Package. It informs the AO/DAO and potential customers of the residual risks with implementing a solution. The additional controls recommended within the risk assessment can be implemented by a customer to further reduce residual risks. C. Comply with CSfC Capability Package It is expected that customers will obtain the current versions of both the Capability Package and the associated Risk Assessment document as necessary and will verify that they have reviewed the current version. To comply with a Capability Package, it is required that the AO/DAO thoroughly reviews the risk assessment and determines that the residual risks are acceptable for the system implementing the CSfC solution. It is strongly recommended that others associated with the system also review the risk assessment. If the customer builds the solution and identifies an issue designing a technologically feasible solution in accordance with the Capability Package requirements, the customer may determine to modify the design to be compliant with the solution. If after the revision or fix to the solution the customer is not able to comply with the Capability Package, the customer should contact the NSA Client Advocate. D. Register Solution The customer/dao will download the registration form from Each registration form is specific to a particular Capability Package thereby requiring different information. In order to accurately complete the form the customer should have detailed architecture and component information for each solution. The form requests the following data at a minimum: DAO POC Integrator POC Operational POC 4
8 Components selected from the CSfC Components List and their purpose within the architecture By signing and submitting the form, the AO/DAO certifies to NSA that the solution is fully compliant with the Capability Package and that AO/DAO accepts the residual risks provided with the Capability Package or has mitigated those risks to an acceptable level. E. Perform System Certification & Accreditation The system containing the CSfC solution undergoes certification and accreditation(c&a) per the process applicable to the customer. At this point the CSfC solution is operational. F. Maintenance Once a solution is fielded the customers must maintain the security of the solutions by implementing updates, responding to alerts, and reporting incidents. NSA Responsibilities: Provide the incident reporting process to the customers Provide customers with CSfC alerts, including Capability Package updates, additional risk data, or direction to change the solution based on additional information Provide incident analysis as needed Customer Responsibilities: Report security incidents to NSA Process CSfC alerts from NSA Implement component updates Apply patches G. Annual Re-assessment and De-registration Prior to the expiration of the CSfC solution registration, the customer will need to determine if the CSfC solution in operational use complies with the latest version of the applicable Capability Package. Capability Packages include requirements that the customer can use to assess against to determine compliance. If the CSfC solution is compliant, the customer will re-register the CSfC solution and obtain approval for another year. If the CSfC solution is not compliant, the customer will re-register the CSfC solution, stating that it is not compliant, and will obtain approval for one year, on the condition that the customer will bring the CSfC solution into full compliance as quickly as possible, not to exceed six months. When the customer no longer needs the CSfC solution, the customer will de-register the CSfC solution using the solution number, which was provided when the solution was registered. 5
9 VI. Contact Information Please direct all inquiries related to the CSfC process and program to 6
POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT
Utilizing the NSA s CSfC Process
Utilizing the NSA s CSfC Process Protecting National Security Systems with Commercial Layered Solutions Authors James Scott (ICIT Senior Fellow Institute for Critical Infrastructure Technology) Drew Spaniel
Commercial Solutions for Classified (CSfC)
Commercial Solutions for Classified (CSfC) Program Overview CONFIDENCE IN CYBERSPACE Chris Magaha Deputy Program Manager [email protected] Strategic Initiative CSfC Layering commercial technologies
Infrastructure Information Security Assurance (ISA) Process
Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology
Publication 805-A Revision: Certification and Accreditation
Postal Bulletin 22358 (3-7-13) Policies, Procedures, and Forms Updates Publication 805-A Revision: Certification and Accreditation Effective immediately, the January 2013 edition of Publication 805-A,
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
5 FAM 860 HARDWARE AND SOFTWARE MAINTENANCE
5 FAM 860 HARDWARE AND SOFTWARE MAINTENANCE (Office of Origin: IRM/BMP/GRP/SM) 5 FAM 861 CONFIGURATION MANAGEMENT 5 FAM 861.1 Overall Department Policy a. Configuration management (CM) is the detailed
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
ASDI Full Audit Guideline Federal Aviation Administration
ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
HP Certified Professional
Securing HP ProCurve Networks Exam HP0-Y24 Exam Preparation Guide Purpose The intent of this guide is to set expectations about the context of the exam and to help candidates prepare for it. Recommended
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
PCI DSS Top 10 Reports March 2011
PCI DSS Top 10 Reports March 2011 The Payment Card Industry Data Security Standard (PCI DSS) Requirements 6, 10 and 11 can be the most costly and resource intensive to meet as they require log management,
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
Information Technology Security Certification and Accreditation Guidelines
Information Technology Security Certification and Accreditation Guidelines September, 2008 Table of Contents EXECUTIVE SUMMARY... 3 1.0 INTRODUCTION... 5 1.1 Background... 5 1.2 Purpose... 5 1.3 Scope...
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Vendor Registration Quick Start Guide
Vendor Registration Quick Start Guide ColoradoVSS Help Desk 303-866-6464 [email protected] www.colorado.gov/vss Overview This guide provides an overview for vendor registration in ColoradoVSS. This guide
Building Robust Security Solutions Using Layering And Independence
Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate
Cyber Essentials Scheme. Summary
Cyber Essentials Scheme Summary June 2014 Introduction... 3 Background... 4 Scope... 4 Assurance Framework... 5 Next steps... 6 Questions about the scheme?... 7 2 Introduction The Cyber Essentials scheme
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
INFORMATION ASSURANCE DIRECTORATE
i National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE MOBILE ACCESS CAPABILITY PACKAGE This Commercial Solutions for Classified (CSfC) (CP) describes how to protect classified
Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007
Security Testing: The Easiest Part of PCI Certification Core Security Technologies September 6, 2007 Agenda Agenda The PCI Standard: Security Basics and Compliance Challenges Compliance + Validation =
AHS Vulnerability Scanning Standard
AGENCY OF HUMAN SERVICES AHS Vulnerability Scanning Standard Jack Green 10/17/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Imprint Machines or Stand-alone Dial-out Terminals Only, no Electronic Cardholder Data Storage
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
Software Contract and Compliance Review
Audit Report Report Number IT-AR-15-009 September 18, 2015 Software Contract and Compliance Review The software contract did not comply with all applicable standards and management did not ensure the supplier
The Information Assurance Process: Charting a Path Towards Compliance
The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.
Security Operations Metrics Definitions for Management and Operations Teams
Whitepaper Security Operations Metrics Definitions for Management and Operations Teams Measuring Performance across Business Imperatives, Operational Goals, Analytical Processes and SIEM Technologies Research
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
UNCLASSIFIED. Trademark Information
SAMSUNG KNOX ANDROID 1.0 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 1 3 May 2013 Developed by Samsung Electronics Co., Ltd.; Fixmo, Inc.; and General Dynamics C4 Systems,
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation
Transformational Vulnerability Management Through Standards Robert A. Martin MITRE Corporation The Department of Defense s new enterprise licenses for vulnerability assessment and remediation tools [1,2]
A. Title 44, United States Code, Chapter 35, Coordination of Federal Information Policy
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 138-01 Revision Number: 00 Issue Date: 4/10/2014 ENTERPRISE INFORMATION TECHNOLOGY CONFIGURATION MANAGEMENT This Directive
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
Mobility Capability Package
Mobility Capability Package 04 November 2013 The Mobility Capability Package (CP) describes a secure Enterprise Mobility Architecture, using a layered security approach with commercial products, services,
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Updating Your Applied Account
For Applied System Administrators Updating Your Applied Account, Assigning Chubb Codes, Configuring Users, Activating New Users To start using Transformation Station to conduct Chubb policy inquiries directly
From Chaos to Clarity: Embedding Security into the SDLC
From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.40 December 30, 1997 SUBJECT: DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ASD(C3I) References: (a) DoD Directive
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Committee on National Security Systems
Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-703 23 April 2013 Information Technology IT Security VULNERABILITY
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
Enterprise Test Management Standards
Enterprise Test Management Standards Version 4.0 09/28/2012 Document Number: FSA_TOADG_STDS_TEST.TMS_001 Document Version Control This section summarizes this document revision history. Each entry includes
How To Comply With The Pci Ds.S.A.S
PCI Compliance and the Data Security Standards Introduction The PCI DSS, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
Registration and PCI DSS compliance validation
Visa Europe A Guide for Third Party Agents Registration and PCI DSS compliance validation October 2015 Version 1.1 Visa Europe 2015 Contents 1 Introduction... 4 1.1 Definitions of Agents... 4 2 Registration
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
DOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS
PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS David Clevenger November 2015 Summary Payment Card Industry (PCI) is an accreditation body that
DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007
DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Vulnerability Disclosure Guideline for Software Developers
Vulnerability Disclosure Guideline for Software Developers Excerpt of Information Security Early Warning Partnership Guideline Appendix 5 Contents 1. Introduction 2 2. Vulnerability Information: Provide
Sample Vulnerability Management Policy
Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director
CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE August 25, 2009 Version
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
Christie Price Subcontract Administrator Lockheed Martin Corporation 12257 South Wadsworth Blvd. Littleton, CO 80125
Functional Area 1 - Research and Development Support ISYS provides research and development, thermal design, analysis, research, planning and development support for the Thermal Protection System of the
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Cyber Education triangle clarifying the fog of cyber security through targeted training
Cyber Education triangle clarifying the fog of cyber security through targeted training Curriculum & Resources Linked / leveraged (on-line, companies, colleges, etc) MS / BS Cyber CISSP / GISP / CISO /
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
DVLA ELISE GSi Closed User Group Code of Connection
DVLA ELISE GSi Closed User Group Code of Connection Security Warning Notice The following handling instructions apply to this document: - Handle, use and transmit with care - Take basic precautions against
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE
R1 Provide Risk Based Assessment Methodology (RBAM) R1.1 Provide evidence that the RBAM includes both procedures and evaluation criteria, and that the evaluation criteria are riskbased R1.2 Provide evidence
Information Security Management Systems
Information Security Management Systems Information Security Management Systems Conformity Assessment Scheme ISO/IEC 27001:2005 (JIS Q 27001:2006) ITMangement Center Japan Information Processing Development
How To Evaluate A Dod Cyber Red Team
CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 CJCSM 6510.03 DISTRIBUTION: A, B, C DEPARTMENT OF DEFENSE CYBER RED TEAM CERTIFICATION AND ACCREDITATION Reference(s): Enclosure F. 1. Purpose a. This manual,
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version
