2.0 ROLES AND RESPONSIBILITIES
|
|
|
- Buck Ryan
- 10 years ago
- Views:
Transcription
1 2.0 ROLES AND RESPONSIBILITIES This handout describes applicable roles and responsibilities for the Capital Planning and Investment Process (CPIC) as presented in the NIST Integrating IT Security into Capital Planning and Investment. It includes a discussion of roles and responsibilities of stakeholders in the various organizational models within federal agencies. Figure 2-1. IT Management Hierarchical Diagram 2.1 Head of Agency The head of the agency is accountable for the security posture of the organization s information technology (IT) infrastructure and is ultimately responsible for completing and submitting annual reports. This position controls both the security policy and the resource budget and has final management responsibility for resource allocation. The head of the agency has the following responsibilities related to integrating IT security into the IT CPIC process Complying with the Federal Information Security Management Act (FISMA) requirements and the related information resource management policies and guidance including Office of Management and Budget (OMB) Circular A-130, NIST Integrating IT Security into 1
2 established by the Director of OMB, and the related IT standards promulgated by the Secretary of Commerce Ensuring the information security and resource management policies and guidance established are integrated with agency-strategic and operational planning processes under FISMA and are communicated promptly and effectively to all relevant officials within their agency Supporting the efforts of the director and the administrator of the General Services Administration to develop, maintain, and promote an integrated Internetbased system of delivering Federal Government information and services to the public Ensuring that senior agency officials provide information security for the information and information systems that support the operations and assets under their control Establishing strategic agency missions and vision (establish goals that flow down to budget, IT, and security themes) and ensuring that information security management processes are seamlessly integrated into those processes and documents Ensuring that the information protection is commensurate with the risk and magnitude of harm resulting from the information s compromise Approving the overall annual IT budgets and overall portfolio (with appropriate security integrated) developed through Investment Review Board (IRB) process Establishing priorities to achieve improvements in compliance to the President s Management Agenda. 2.2 Senior Agency Officials Senior agency officials provide information security for the information and information systems that support the operations and assets under their control, under the direction of the head of the agency. These duties include Assessing the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information systems under their control Determining the levels of information security appropriate to protect information systems under their control Implementing policies and procedures to cost effectively reduce risks to an acceptable level Periodically testing and evaluating information security controls and techniques to ensure they are effectively implemented NIST Integrating IT Security into 2
3 Delegating to the agency Chief Information Officer (CIO) the authority to ensure compliance with agency security requirements Providing senior IT advice to the head of each agency and the Management Review Board. 2.3 Chief Information Officer The Information Technology Management Reform Act of 1996 (also known as the Clinger-Cohen Act) requires agencies to appoint CIOs. The agency CIO is the senior IT advisor to the IRB and the head of the agency. In this capacity, the CIO Assists senior agency officials with IT issuesdevelops and maintains an agencywide information security program Develops and maintains risk-based information security policies, procedures, and control techniques Designates a senior agency information security officer to carry out CIO directives as required by FISMA Designs, implements, and maintains processes for maximizing the value and managing the risks of IT acquisitions Presents proposed IT portfolios to the IRB Provides final portfolio endorsements Presents and recommends control and evaluates decisions and recommendations Ensures IT training for agency staff and oversees IT security personnel. 2.4 Senior Agency Information Security Officer As mandated by FISMA, the senior agency information security officer is appointed by the CIO and manages information security throughout the agency. The senior agency information security officer is responsible for coordinating program requirements throughout the agency with designated points of contact and project managers, including Developing and maintaining an agency-wide information security program Issuing annual IT planning guidance, including security themes, objectives, and prioritization criteria for new and legacy systems. Developing and maintaining information security policies, procedures, and control techniques Assisting senior agency officials concerning their responsibilities. NIST Integrating IT Security into 3
4 2.5 Chief Financial Officer The agency chief financial officer (CFO) is the senior financial advisor to the IRB and the head of the agency. In this capacity, the CFO is responsible for Reviewing cost goals of each major investment Reporting financial management information to OMB as part of the President s budget Complying with legislative and OMB-defined responsibilities as they relate to IT capital investments Reviewing systems that impact financial management activities Forwarding investment assessments to the IRB. 2.6 Investment Review Board The members of the IRB evaluate existing and proposed IT investments to determine the appropriate mix of investments that will allow the agency to achieve its goals. The IRB Is composed of the CFO and organization and bureau management Operates at the enterprise level Approves the CIO s IT strategic guidance, including security themes and prioritization criteria (these themes and criteria need to reflect the evolving needs to security) Approves the controls and evaluates the IT portfolio with embedded security requirements, objectives, measures, and milestones Ensures alignment of President s Management Agenda (PMA) achievement, strategic agency missions, and vision with IT security themes and criteria Technical Review Board The Technical Review Board (TRB) is comprised of OCIO elements (cyber security and architecture plus others), managers, and other applicable members. In this capacity, the TRB Conducts detailed IT investment review and security analysis and reviews business cases for security requirements Balances IT investment portfolios based on CIO/IRB IT security themes and prioritization criteria Acts as a Department focal point for coordinating OCIO strategic planning, architectural standards, and outreach to organizations and bureaus. NIST Integrating IT Security into 4
5 2.6.2 IT Capital Planning and Architecture Subcommittees Responsibilities of the IT Capital Planning and Architecture Subcommittees are to Provide expertise on areas from OCIO and Operating Units, and as subject matter experts, perform an advisory function Translate OMB IT capital planning security guidance into operational and internal process control enhancements Supply process improvements and provide Enterprise Architecture support for the Technical Review Board. 2.7 Operating Unit Executive Management Operating Unit Executive Management focuses on processes for integrating IT security themes into business cases and the OMB Exhibit 53/300 process. 2.8 Project Manager/System Owner The project manager has overall responsibility for coordinating the management and technical aspects of the life cycle of a system. Responsibilities of a project manager may include (but are not limited to) the following Developing a project management plan that integrates security throughout the life cycle Developing a cost and schedule baseline and completing a project within schedule and budget constraints while meeting the customer s needs Coordinating the development, implementation, and operation and maintenance of a system with appropriate units within an agency Reporting the results of projects to the system owner and other appropriate agency staff Presenting, when appropriate, the progress of critical projects to the OCIO, the IRB, and other applicable review entities. The system owner is located within the bureau/operating unit benefiting from or requesting the systems project/investment and is frequently thought of as the customer for that project. The system owner performs the following functions Maintains active senior-level involvement throughout the development of the system Participates in project review activities and reviews project deliverables Coordinates activities with the agency senior IT executive NIST Integrating IT Security into 5
6 Obtains and manages the budget throughout the project's life cycle against a project manager s delivered, locked baseline Holds review and approval authority for ensuring that developed products incorporate security and meet user requirements Provides baseline assessment performance measures to evaluate the security of the delivered IT initiative. NIST Integrating IT Security into 6
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT
5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT (CT:IM-92; 08-01-2007) (Office of Origin: IRM/BPC/PRG) 5 FAM 671 WHAT ARE IT PERFORMANCE MEASURES AND WHY ARE THEY REQUIRED?
A. This Directive applies throughout DHS, unless exempted by statutory authority.
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 103-02 Revision Number: 00 Issue Date: 6/19/2014 ENTERPRISE ARCHITECTURE MANAGEMENT This Directive establishes the Department
U.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release: 1-1718 Date: MANUAL TRANSMITTAL SHEET Subject 1265 Information Technology Investment Management (ITIM)
United States Department of Health & Human Services Enterprise Architecture Program Management Office. HHS Enterprise Architecture Governance Plan
United States Department of Health & Human Services Enterprise Architecture Program Management Office HHS Enterprise Architecture Governance Plan Version 3.0 February 2007 Approvals The Health and Human
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
HHS OCIO Policy for Information Technology (IT) Enterprise Performance Life Cycle (EPLC)
Office of the Chief Information Officer Office of the Assistant Secretary for Resources and Technology Department of Health and Human Services HHS OCIO Policy for Information Technology (IT) Enterprise
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 200.1A Approved: SUBJECT: INFORMATION TECHNOLOGY MANAGEMENT 1. OBJECTIVES. The Department of Energy s (DOE) overarching mission, to advance the national,
UNITED STATES PATENT AND TRADEMARK OFFICE. Information Technology Investment Review Board. Agency Administrative Order 212-05 TABLE OF CONTENTS
UNITED STATES PATENT AND TRADEMARK OFFICE Information Technology Investment Review Board Agency Administrative Order 212-05 Date of Issuance: November 22, 2005 Effective Date: November 22, 2005 Section
DIRECTIVE TRANSMITTAL
U.S. NUCLEAR REGULATORY COMMISSION DIRECTIVE TRANSMITTAL TN: DT-07-08 To: Subject: Purpose: Office and Division of Origin: NRC Management Directives Custodians Transmittal of Management Directive 2.8,
Information Security Handbook: A Guide for Managers
NIST Special Publication 800-100 Information Security Handbook: A Guide for Managers Recommendations of the National Institute of Standards and Technology Pauline Bowen Joan Hash Mark Wilson I N F O R
Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB
Value to the Mission FEA Practice Guidance Federal Enterprise Program Management Office, OMB November 2007 FEA Practice Guidance Table of Contents Section 1: Overview...1-1 About the FEA Practice Guidance...
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
CMS Policy for Information Security and Privacy
Office of the Administrator Centers for Medicare & Medicaid Services CMS Policy for Information Security and Privacy FINAL Version 2.0 April 11, 2013 Document Number: CMS-OA-POL-SEC01-02.0 CMS Policy for
Guide for the Security Certification and Accreditation of Federal Information Systems
NIST Special Publication 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems Ron Ross Marianne Swanson Gary Stoneburner Stu Katzke Arnold Johnson I N F O R M A
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT 5 FAM 621 GENERAL (Office of Origin: IRM/BMP/SPO/PMD) a. The strategic importance of Information Technology (IT) to the mission of the State Department
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
IT Project Governance Manual Version 1.1
IT Project Governance Manual Version 1.1 A Mandatory Reference for ADS Chapter 577 New Reference: 04/13/2010 Responsible Office: CIO File Name: 577mak_041310 UNITED STATES AGENCY FOR IT Project Goverance
Approved by the Assistant Secretary for Administration and Management (ASAM) on 2/28/2003 and published @ 68 FR 1
Approved by the Assistant Secretary for Administration and Management (ASAM) on 2/28/2003 and published @ 68 FR 1 11555-62 on 3/11/2003; Approved by the ASAM on 7/28/2003 and published @ 68 FR 57695-96
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash
Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Introduction Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need
INFORMATION SECURITY
NIST Special Publication 800-65 DRAFT Integrating IT Security into the Capital Planning and Investment Control Process Joan Hash, Nadya Bartol, Holly Rollins, Will Robinson, John Abeles, and Steve Batdorff
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 205.1A SUBJECT: DEPARTMENT OF ENERGY CYBER SECURITY MANAGEMENT Approved: 1. PURPOSE. The Department of Energy s (DOE s) overarching mission to advance
Department of Homeland Security
Department of Homeland Security DHS Information Technology Management Has Improved, But Challenges Remain OIG-12-82 May 2012 Office of Inspector General U.S. Department of Homeland Security Washington,
Guide to IT Capital Planning and Investment Control (CPIC)
U.S. Department of Energy Guide to IT Capital Planning and Investment Control (CPIC) September 2010 Office of the Chief Information Officer TABLE OF CONTENTS 1.0 Preface... 1 2.0 Introduction... 2 2.1
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15
U.S. NUCLEAR REGULATORY COMMISSION MANAGEMENT DIRECTIVE (MD) MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15 Volume 12: Approved By: Security R. W. Borchardt Executive Director for Operations Date Approved:
CMS Policy for Information Technology (IT) Investment Management & Governance
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Policy for Information Technology (IT) Investment Management & Governance May 17, 2007 Document Number:
Small Business. Leveraging SBA IT resources to support America s small businesses
Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector
USAID Management Operations Council Charter
USAID Management Operations Council Charter Version 1.0 Date: August 1, 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 PURPOSE... 1 1.2 OBJECTIVE... 1 1.3 SCOPE... 1 2. OVERVIEW OF THE MOC... 1 2.1 MOC
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
OPM System Development Life Cycle Policy and Standards. Table of Contents
Table of Contents 1. INTRODUCTION... 4 1.1 Purpose... 4 1.1.1 OPM SDLC Policy... 4 1.1.2 Key Concepts and Principles... 4 1.2 Scope and Applicability... 5 1.3 Compliance, Enforcement and Exceptions...
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES
How To Understand The Role Of Enterprise Architecture In The Context Of Organizational Strategy
Enterprise Architecture in the Context of Organizational Strategy Sundararajan Vaidyanathan Senior Enterprise Architect, Unisys Introduction The Presidential Management Agenda (PMA) 1 is geared towards
STATE OF HAWAII CHIEF INFORMATION OFFICER AND THE OFFICE OF INFORMATION MANAGEMENT AND TECHNOLOGY UPDATE ON THE INFORMATION TECHNOLOGY STRATEGIC PLAN
STATE OF HAWAII CHIEF INFORMATION OFFICER AND OFFICE OF INFORMATION MANAGEMENT AND TECHNOLOGY REPORT ON UPDATE ON THE INFORMATION TECHNOLOGY STRATEGIC PLAN DECEMBER 2011 SUBMITTED TO THE TWENTY-SIXTH STATE
A. Enhanced Delivery of Information and Services to the Public - Sec. 101, 3602
Department of the Interior Report on the Implementation of the E-Government Act Fiscal Year 2013 A. Enhanced Delivery of Information and Services to the Public - Sec. 101, 3602 Activity #1. Cloud Services:
A Role-Based Model for Federal Information Technology/ Cybersecurity Training
NIST Special Publication 800-16 Revision 1 (3 rd Draft) A Role-Based Model for Federal Information Technology/ Cybersecurity Training Patricia Toth Penny Klein I N F O R M A T I O N S E C U R I T Y NIST
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
U.S. Department of Education Federal Student Aid
U.S. Department of Education Federal Student Aid Lifecycle Management Methodology Stage Gate Review Process Description Version 1.3 06/30/2015 Final DOCUMENT NUMBER: FSA_TOQA_PROC_STGRW.NA_001 Lifecycle
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Publication Number: Third Draft Special Publication 800 16 Revision 1. A Role Based Model for Federal Information Technology / Cyber Security Training
This (Second) DRAFT of Special Publication 800 16 Revision 1 document has been superceded by the following draft publication: Publication Number: Third Draft Special Publication 800 16 Revision 1 Title:
INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION
INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION Report No.: 2015-ITA-017 November 2015 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR
Identification And Review Of The Department s Major Information Technology Systems Inventory
Identification And Review Of The Department s Major Information Technology Systems Inventory U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 07-37 June 2007 IDENTIFICATION
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
IT Baseline Management Policy. Table of Contents
Table of Contents 1. INTRODUCTION... 1 1.1 Purpose... 2 1.2 Scope and Applicability... 2 1.3 Compliance, Enforcement, and Exceptions... 3 1.4 Authority... 3 2. ROLES, RESPONSIBILITIES, AND GOVERNANCE...
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
FISMA Compliance: Making the Grade
FISMA Compliance: Making the Grade A Qualys Guide to Measuring Risk, Enforcing Policies, and Complying with Regulations EXECUTIVE SUMMARY For federal managers of information technology, FISMA is one of
NISTIR 7359 Information Security Guide For Government Executives
NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
Capital Planning and Investment Control Guide
Department of Homeland Security Capital Planning and Investment Control Guide Version 4.0 May 2007 Prepared by the Office of the Chief Information Officer Document Version History Document Version Version
NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS
MARCH 18, 2013 AUDIT REPORT OFFICE OF AUDITS NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration
U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report. Security Over Wireless Networking Technologies
U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report Security Over Wireless Networking Technologies DOE/IG-0617 August 2003 Department of Energy Washington, DC 20585
Information Resources Management (IRM) Strategic Plan
National Aeronautics and Space Administration Information Resources Management (IRM) Strategic Plan Office of the Chief Information Officer March 2014 www.nasa.gov NASA IRM Strategic Plan CIO s Introductory
State of Minnesota IT Governance Framework
State of Minnesota IT Governance Framework June 2012 Table of Contents Table of Contents... 2 Introduction... 4 IT Governance Overview... 4 Process for Developing the New Framework... 4 Management of the
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET. 1283 Data Administration and Management (Public)
Form 1221-2 (June 1969) Subject UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET 1283 Data Administration and Management (Public) Release 1-1742 Date 7/10/2012
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
FITARA Implementation M-15-14: Management and Oversight of Federal IT https://management.cio.gov/
FITARA Implementation M-15-14: Management and Oversight of Federal IT https://management.cio.gov/ Ben Sweezy, Malissa Levesque, Jamie Berryhill Office of Management and Budget 1 Objectives of FITARA Implementation
Baseline Cyber Security Program
NNSA Policy Letter NAP-14.1-D Approved: Baseline Cyber Security Program NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Information Management and the Chief Information Officer AVAILABLE ONLINE AT:
United States Antarctic Program Information Resource Management Directive 5000.01 The USAP Information Security Program
The National Science Foundation Office of Polar Programs United States Antarctic Program Information Resource Management Directive 5000.01 The USAP Information Security Program Organizational Function
