NOTICE: This publication is available at:
|
|
|
- Scot Howard
- 10 years ago
- Views:
Transcription
1 Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction May 2012 Information Technology IT Security Assignment of Responsibilities NOTICE: This publication is available at: OPR: OCIO (Sherry Richardson) Type of Issuance: Revised Certified by: OCIO (Iftikhar Jamil) SUMMARY OF REVISIONS: Superseded NWS Instruction , Assignment of Responsibilities, and dated November 14, Deleted definitions section and added additional roles and responsibilities. Revised some roles and responsibilities. Signed 5/14/2012 Iftikhar Jamil Date NWS Chief Information Officer 1
2 Table of Contents 1 Introduction Assignment of Responsibilities Chief Information Officer (CIO) Chief Information Security Officer (CISO) NWS IT Security Officer (ITSO) Authorizing Official (AO) System Owner (SO) IT System Security Officers (ISSO) Certification Agent/Certification Assessor (CA) Network and System Administrators (N/SA) End Users Chief Financial Officer (CFO)...9 2
3 1 Introduction. The National Weather Service (NWS) Information Technology (IT) Security Program establishes the required framework of security controls that ensure the inclusion of security in the daily operation and management of NWS IT Systems and Resources. The management structure provides a foundation for effectively managing the confidentiality, integrity, and availability of the information and the information systems supporting the mission of the NWS. This Instruction defines the roles and responsibilities specified for all NWS employees (federal and contractor). 2 Assignment of Responsibilities. The structure for security implementation and administration within NWS is defined within this instruction, which establishes the following authorities and responsibilities: 2.1 NWS Chief Information Officer (CIO) Oversees the NWS IT Security Program Appoints, in writing, a Chief Information Security Officer (CISO) to implement the IT Security Program Ensures the implementation of the NWS IT Security Program which complies with NOAA guidance in regards to Federal Information Security Management Act of 2002 (FISMA) Reports the status of the NWS IT Security Program to the NWS Assistant Administrator (AA), and identifies any weaknesses of the program Approves and issues policy and/or instructions that establish a framework for the NWS IT Security Program Monitors, evaluates, and reports the status of IT security within NWS to the NOAA CIO and the NWS AA Functions as the AO for all NWS systems unless the role of AO is re-delegated to the Financial Management Center (FMC) directors Responsible for taking annual role-based security training commensurate with the role, per Department of Commerce (DOC), Commerce Interim Technical Requirements (CITR) CITR-006: Information System Security Training for Significant Roles. 2.2 NWS Chief Information Security Officer (CISO) 3
4 2.2.1 Responsible for ensuring that the appropriate operational security posture is maintained for NWS information systems and programs Designates in writing the NWS Information Technology Security Officers which will implement the IT Security Program Ensures each NWS system with a FISMA ID has an appointed ISSO Ensures that all IT systems are identified and accredited Serves as a voting member of the NOAA IT Security Council and attends regularly scheduled meetings to obtain current information on issues relating to Federal, Department of Commerce (DOC), and NOAA IT security law, policies, regulations, guidelines or concerns Provides security program budgetary advice consistent with business needs to appropriate levels of management for planning purposes Advises appropriate levels of management about technological advances in IT security which can be used on an organizational scale to improve the security of the system or can keep the same level of security at a reduced cost Responsible for maintaining a security certification as specified by DOC CITR NWS IT Security Officer (ITSO) Serves as the central point of contact for the NWS IT Security Program for all information systems Develops and maintains NWS IT security policy, procedures, standards, and guidance consistent with Federal, DOC, and NOAA requirements Ensures that all systems have in place effective security documentation, including a risk assessment, current IT security plans that accurately reflect system status, annual system assessments, current tested contingency plans, and current Authorization and Assessment (A&A) Conducts continuous monitoring of the NWS IT Security Program to ensure effective implementation of and compliance with established policies and procedures Establishes procedures for an IT security awareness and training program for all NWS personnel including specialized training as necessary for systems administrators, Contracting Officer s Technical Representatives (COTRs), etc. 4
5 2.3.6 Acts as the NWS s central point of contact for all incidents Provides information to appropriate NWS personnel concerning risks and potential risks to NWS systems If requested by the SO and approved by the CISO, can function as the Certification Agent/Certification Assessor (CA) for the requesting NWS system(s) Responsible for maintaining a security certification as specified by DOC CITR Authorizing Official (AO) Oversees the budget and business operations of the information systems within their area of responsibility Assumes responsibility for operating an information system at an acceptable level of risk to operations, assets, or individuals by granting an Authorization to Operate Approves system security requirements, including but not limited to, the System Security Plans (SSP), Interconnection Security Agreements (ISA), Memorandums of Agreements (MOA) and/or Memorandums of Understanding (MOU) Responsible for taking annual role-based security training commensurate with the role, per DOC CITR-006: Information System Security Training for Significant Roles Appoints qualified personnel in writing to act and assume the roles and responsibilities of Information System Security Officer (ISSO). 2.5 System Owner (SO) Ensures security considerations in application systems procurement or development, implementation, operation and maintenance, and disposal activities (i.e., life cycle management) Responsible for ensuring all controls are in effect or have associated POAMs and all POAMs are closed on schedule Responsible for establishing, training, testing and updating IT contingency plan Ensures the security of data residing on their system(s) Determines and implements an appropriate level of security commensurate with the FIPS 199 categorization of their system. 5
6 2.5.6 Maintains an updated list of hardware and software inventory operated/used by the system. NWSI Develops and maintains security plans and contingency plans for all FISMA ID systems under their responsibility Performs security impact analysis whenever the level of security on a system or network is modified in order to re-evaluate sensitivity of the system, risks, and mitigation strategies Conducts assessments of system safeguards and program elements, and ensures initial authorization and assessment of the system as well as the annual assessments for continuous monitoring Reports all incidents to the NWS ITSO and NOAA Computer Incident Response Team (NCIRT) Responsible for taking annual role-based security training commensurate with the role and ensures that system personnel are properly designated monitored and receive appropriate role based IT security training as designated in DOC CITR Ensures IT contracts pertaining to the system include provisions for security Ensures appropriate system-level security controls and documentation are maintained for the information system of their responsibility Recommends to the AO in writing, qualified personnel to act and assume the roles and responsibilities of Information System Security Officer (ISSO). 2.6 Information System Security Officer(s) (ISSO) Advises the system owner regarding security considerations in applications systems procurement or development, implementation, operation and maintenance, and disposal activities (i.e., life cycle management) Assists in the determination of an appropriate level of security commensurate with the level of sensitivity Assists in the development and maintenance of security and contingency plans for all FISMA ID systems under their responsibility Participates in security impact analysis to periodically re-evaluate sensitivity of the system, risks, and mitigation strategies. 6
7 2.6.5 Participates in security impact analysis of system safeguards and program elements and in authorization and assessment (A&A) of the system for continuous monitoring Is the point of contact for all security incidents within their area of responsibility and reports using the NOAA form to the NOAA Computer Incident Response Team (NCIRT) Handles and investigates incidents in cooperation with and under direction of the NWS ITSO and NCIRT Participates in vulnerability scanning and penetration testing of systems/networks Will not function as the network and/or systems administrator for any system they are assigned to as the ISSO unless a waiver with justification is requested from the NWS AO. Separation of duties dictates that an ISSO cannot be a systems administrator for the same IT system Ensure all user accounts are disabled within 24 hours of notification of user s separation from NWS and immediately for individuals being separated for adverse reasons Monitor and review security policy, practices, and procedures Ensure the security of all interfaces between NWS and external systems, develop and maintain interconnection documentation (ISA, SLA, MOU, and MOA) Responsible for maintaining a security certification as specified by DOC CITR Certification Agent/Certification Assessor (CA) Conduct security assessments for all FIPS 199 systems. For Moderate and High systems, the CA must be independent. Independent is defined as independent from the persons directly responsible for the development and day to day operation of the systems Assist System Owners and ISSOs in determining whether existing assessment results may be reused Provide recommended mitigation strategies for identified vulnerabilities attributed to NWS information systems. 2.8 Network and System Administrators (N/SA) Responsible for specific aspects of system security, such as adding and deleting user accounts as authorized by the system owner or ISSO, patching systems, implementing 7
8 secure configurations as prescribed in the system security plans, and normal operations of the system in keeping with job requirements Responsible for implementing DOC, NOAA, and NWS security policies, procedures, and guidelines on local systems and networks Assists in the development and maintenance of security and contingency plans for FISMA ID systems under their responsibility Participates in security impact analysis to periodically re-evaluate sensitivity of the system, risks, and mitigation strategies Participates in assessments of system safeguards and program elements and in authorization and assessment of the system Evaluates proposed technical security controls to assure proper integration with other system operations Identifies requirements for resources needed to effectively implement technical security controls Ensures the integrity of technical security controls Reports all incidents to the system ISSO and system owner and assists in the investigation of incidents as directed Reads and understands all applicable training and awareness materials Reads and understands all applicable use policies or other rules of behavior regarding use or abuse of operating unit IT resources Develops system administration and operational procedures and manuals Evaluates and develops procedures that assure proper integration of service continuity with other system operations Knows which systems or parts of systems for which they are directly responsible (e.g., network equipment, servers, LAN, etc.) Knows the sensitivity of the data they handle and take appropriate measures to protect it Will not function as the ISSO on any system he/she functions as the system administrator unless a waiver with justification is requested from the NWS AO. 8
9 Responsible for maintaining the system(s) baseline(s), coordinating changes with the ISSO, SO and Change Control Board (CCB) and obtaining approval for baseline deviations. 2.9 End Users Aware of the sensitivity of the information they are responsible for and the proper handling thereof in order to maintain the confidentiality, integrity and availability of the information Reads and understands all applicable training and awareness materials Reads and understands all applicable use policies and other rules of behavior regarding use or abuse of operating unit IT resources Knows which systems or parts of systems for which they are directly responsible (printer, desktop, etc.) Reports all incidents to their appropriate system administrator and ISSO in a timely manner Knows and abides by all applicable DOC, NOAA and NWS policies and procedures Successfully completes annual IT Security Awareness training and by doing so, recertifies their knowledge of and adherence to the NWS Rules of Behavior Chief Financial Officer Review cost estimates of each major information security investment Review and report financial management information on security investments, as required Comply with legislative and OMB defined responsibilities as they relate to IT capital investments. 9
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-703 23 April 2013 Information Technology IT Security VULNERABILITY
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 30-1203 JANUARY 23, 2012 Maintenance, Logistics, and Facilities Configuration
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Office of the Chief Information Security Officer Version 10 September 16, 2013 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
EPA Classification No.: CIO-2150.3-P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM SECURITY ASSESSMENT AND AUTHORIZATION PROCEDURES V2 JULY 16, 2012 1. PURPOSE The
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Information Security Office Version 8.0 June 06, 2011 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM SECURITY OFFICER (ISSO)
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
5 FAM 1060 INFORMATION ASSURANCE MANAGEMENT
5 FAM 1060 INFORMATION ASSURANCE MANAGEMENT 5 FAM 1061 GENERAL (CT:IM-141; 06-07-2013) (Office of Origin: IRM/IA) a. The Chief Information Security Officer (CISO) operates under the direction and supervision
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
OPM System Development Life Cycle Policy and Standards. Table of Contents
Table of Contents 1. INTRODUCTION... 4 1.1 Purpose... 4 1.1.1 OPM SDLC Policy... 4 1.1.2 Key Concepts and Principles... 4 1.2 Scope and Applicability... 5 1.3 Compliance, Enforcement and Exceptions...
AODR Role-Based Training. Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security
AODR Role-Based Training Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security 1 Objectives Gain Understanding and Working Knowledge of: AODR Authority, Role
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 10 [June 6, 2013] TABLE OF CONTENTS 1.0 Introduction... 7 1.1 Background... 7 1.2 Purpose... 8 1.3 Scope...
Information Security and Privacy Policy Handbook
Information Security and Privacy Policy Handbook This document implements OPM s Information Security and Privacy Policy requirements for the protection of information and information systems. Chief Information
Lots of Updates! Where do we start?
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project Management Community Meeting October 18, 2011 .
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
Information Security for IT Administrators
Fiscal Year 2015 Information Security for IT Administrators Introduction Safeguarding the HHS Mission Information Security Program Management Enterprise Performance Life Cycle Enterprise Performance Life
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Information Technology Security Certification and Accreditation Guidelines
Information Technology Security Certification and Accreditation Guidelines September, 2008 Table of Contents EXECUTIVE SUMMARY... 3 1.0 INTRODUCTION... 5 1.1 Background... 5 1.2 Purpose... 5 1.3 Scope...
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
CMS Policy for Information Security and Privacy
Office of the Administrator Centers for Medicare & Medicaid Services CMS Policy for Information Security and Privacy FINAL Version 2.0 April 11, 2013 Document Number: CMS-OA-POL-SEC01-02.0 CMS Policy for
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
Office of Inspector General Audit Report
Office of Inspector General Audit Report USMMA SECURITY CONTROLS WERE NOT SUFFICIENT TO PROTECT SENSITIVE DATA FROM UNAUTHORIZED ACCESS Maritime Administration Report Number: FI-2012-138 Date Issued: May
OFFICE OF INSPECTOR GENERAL
U.S. CONSUMER PRODUCT SAFTEY COMMISSION OFFICE OF INSPECTOR GENERAL FY 2014 FEDERAL INFORMATION SECURITY MANAGEMENT ACT REVIEW REPORT Issued: 11/14/2014 This report conveys the results of the OIG s review
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
AHS Vulnerability Scanning Standard
AGENCY OF HUMAN SERVICES AHS Vulnerability Scanning Standard Jack Green 10/17/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
IT Compliance in Acquisition Checklist v3.5 Page 1 of 7
IT Compliance in Acquisition Checklist v3.5 Page 1 of 7 Instructions: This IT checklist, with appropriate signatures, must be completed for Information Technology (IT) acquisitions within the Department
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
FINAL Version 1.0 June 25, 2014
CENTERS for MEDICARE & MEDICAID SERVICES Enterprise Information Security Group 7500 Security Boulevard Baltimore, Maryland 21244-1850 Risk Management Handbook Volume III Standard 7.2 FINAL Version 1.0
INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY
DHS Sensitive Systems Policy Directive 4300A
DHS Sensitive Systems Directive 4300A Version 8.0 March 14, 2011 This is the implementation of DHS Management Directive 140-01 Information Technology System Security, July 31, 2007 DEPARTMENT OF HOMELAND
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This
Baseline Cyber Security Program
NNSA Policy Letter NAP-14.1-D Approved: Baseline Cyber Security Program NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Information Management and the Chief Information Officer AVAILABLE ONLINE AT:
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Infrastructure Information Security Assurance (ISA) Process
Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
United States Patent and Trademark Office
U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office FY 2009 FISMA Assessment of the Patent Cooperation Treaty Search Recordation System (PTOC-018-00) Final
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
Automate Risk Management Framework
Automate Risk Management Framework Providing Dynamic Continuous Monitoring, Operationalizing Cybersecurity and Accountability for People, Process and Technology Computer Network Assurance Corporation (CNA)
MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15
U.S. NUCLEAR REGULATORY COMMISSION MANAGEMENT DIRECTIVE (MD) MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15 Volume 12: Approved By: Security R. W. Borchardt Executive Director for Operations Date Approved:
How To Audit The National Security System
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Federal Information Security Modernization Act Audit FY 2015 Report Number 4A-CI-00-15-011 November
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE CENTRAL REGION SUPPLEMENT 01-2005 APPLICABLE TO 30-1203, 60-702 August 26, 2011 Maintenance,
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
United States Department of Agriculture. Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
NASA Information Technology Requirement
NASA Information Technology Requirement NITR 2810-17 Effective Date: November 12, 2008 Expiration Date: May 16, 2011 System Maintenance Policy and Procedures Responsible Office: Office of the Chief Information
FISMA Implementation Project
FISMA Implementation Project The Associated Security Standards and Guidelines Dr. Ron Ross Computer Security Division Information Technology Laboratory 1 Today s Climate Highly interactive environment
SECURITY ASSESSMENT AND AUTHORIZATION
SECURITY ASSESSMENT AND AUTHORIZATION INFORMATION SYSTEM SECURITY ASSESSMENT AND AUTHORIZATION PROCESS CHAPTER 02 ITS-HBK-2810.02-02 HANDBOOK EFFECTIVE DATE: 20150201 EXPIRATION DATE: 20180201 RESPONSIBLE
In Brief. Smithsonian Institution Office of the Inspector General
In Brief Smithsonian Institution Office of the Inspector General Smithsonian Institution Network Infrastructure (SINet) Report Number A-09-01, September 30, 2009 Why We Did This Audit Under the Federal
Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.
OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information
