5 FAH-8 H-351 CLOUD COMPUTING
|
|
|
- Ethan Garry Johnston
- 10 years ago
- Views:
Transcription
1 5 FAH-8 H-350 CLOUD COMPUTING (Office of Origin: IRM/BMP) 5 FAH-8 H-351 CLOUD COMPUTING GOVERNANCE BOARD a. The Cloud Computing Governance Board (CCGB) exists to provide advice to the Authorizing Official (AO) regarding Department Business and/or System Owners (SOs) use of cloud services and providers. The board s recommendation to the AO must balance the need to mitigate risks to systems with the business need being proposed. The CCGB will act as a sub-group of the Department s E- Governance (E-Gov) activities and the CCGB Executive Secretariat (CCGB-ES) will be determined by the CIO. b. The CCGB is composed of functional members and general members. The functional members act as subject matter experts and verify compliance with key functional areas for the use of cloud services. The general members, with the Secretariat, formulate recommendations to the AO and present business need based on program knowledge. Additional members can request to participate in accordance with the CCGB charter. A simple majority of general members are needed to approve services. 5 FAH-8 H Board Membership Functional Membership: Functional Member Chief Information Security Officer (CISO) Director of the Office of Cybersecurity (DS/SI/CS) Office of the Legal Adviser (L) The Office of Global Information Subject Matter Expertise FISMA compliance and IT Security IT Security Legal issues Privacy and Records Issues 5 FAH-8 H-350 Page 1 of 12
2 Services (A/GIS) Office of the Procurement Executive (A/OPE) and the Office of Acquisitions Management (A/LM/AQM) Acquisition Policies General Membership: General Member PD/CIO for IRM Notes CCGB Chair Chief Architect (IRM/BMP/OCA) Strategic Planning Office (IRM/BMP/SPO) Cloud Reporting to OMB Chief Technology Officer for Diplomatic Security (DS/EX/CTO) Director of the Office of Management Policy, Rightsizing and Innovation (M/PRI) Under Secretary for Public Diplomacy and Public Affairs Director of Management Innovation or another representative appointed by the Director of the Office of Management Policy, Rightsizing and Innovation (M/PRI) R-Family Representative nominated by the U/S Secretary s Executive Secretariat (S/ES) Regional Executive Directors Two Regional Representatives jointly nominated by the Regional Executive Directors 5 FAH-8 H Review of Cloud Products by the CCGB CCGB Requirements for Reviewing AO Approved Cloud Products or Services: 5 FAH-8 H-350 Page 2 of 12
3 Due Diligence Requirements System Categorization Existing volume purchase agreement (such as a BPA or IDIQ) Cloud Computing Review Packet (CCRP) Submission Requirements Response to spillage of information Monitoring and response to cyber incidents Business contingency plans Cloud provider support for federal mandates Records management plan System Security Plan Concept of Operations Business justification CCGB Requirements for Reviewing Cloud Products or Services with FedRAMP Approval or an Existing Agency Authority to Operate (ATO): Due Diligence Requirements System Categorization Existing volume purchase agreement (such as a Blanket Purchase Agreement [BPA] or Indefinite Delivery/Indefinite Quantity [IDIQ]) or creation of a new vehicle to allow the Department to coordinate the purchase of cloud products or services FedRAMP Approval or ATO that matches the risk and impact identified in the System Categorization CCRP Submission Requirements Response to spillage of information Monitoring and response to cyber incidents Business contingency plans Cloud provider support for Federal mandates Records management plan CCGB Requirements for Reviewing Cloud Products or Services without FedRAMP Approval or an Existing Agency ATO: Due Diligence Requirements CCRP Submission Requirements 5 FAH-8 H-350 Page 3 of 12
4 System Categorization Existing volume purchase agreement (such as a BPA or IDIQ) or creation of a new vehicle to allow the Department to coordinate the purchase of cloud products or services Complete Department Assessment and Authorization (A&A) process for the cloud service or product System Security Plan Concept of Operations Business justification Response to spillage of information Monitoring and response to cyber incidents Business contingency plans Cloud provider support for federal mandates Records management plan System Security Plan Concept of Operations Business justification Alternative of Analysis (AoA) justifying the use of a nonapproved cloud service The CCGB favors implementations that meet the following criteria: (1) Programs or projects utilizing a cloud product or service previously reviewed by the CCGB and approved by the AO; (2) The requested cloud product has an existing ATO issued by a federal agency or is FedRAMP approved at the appropriate risk and impact level; (3) The procurement utilizes a contract vehicle negotiated by the Department or a federal agency that provides high value and return on investment (ROI) through volume pricing in addition to standardized language for compliance with federal and Department regulations for IT systems; and (4) SOs seeking approval of the AO and review by the CCGB must provide a CCRP. Unless a requirement is provided via another Department process, the documentation template will be provided by the Executive Secretariat of the CCGB. The CCRP must include the following information: (a) Response to spillage of information: Because the Department does not have physical control of the hardware, procedures for removing information from systems hosted on cloud systems must be explicitly developed. These procedures may vary from provider to provider, but must meet Department standards. See 5 FAM 480 and 12 FAM 530 for initial guidance; (b) Monitoring for and response to cyber incidents: System, application, and data owners and project managers must ensure that contracts with cloud providers have clauses that allow the Department timely access to the appropriate data to monitor and respond to cyber 5 FAH-8 H-350 Page 4 of 12
5 incidents. See 1 FAM for guidance; (c) Business contingency plans: System, application and data owners and project managers must document contingency plans to execute in the event that a cloud provider goes out of business, undergoes a catastrophic hardware failure, or experiences some other event that severely impacts the availability of data or the service. See 12 FAM Backup and Contingency Plans for more information; (d) Cloud provider support for federal mandates: Requirements for Federal IT systems are constantly evolving. System, application, and data owners should ensure that providers are contractually bound to support federal requirements; (e) Records management: The National Archives and Records Administration has requirements for the types and lengths of time that data that must be preserved. Systems implemented in the cloud must meet these requirements. See 5 FAM 400 for more information; (f) System Security Plan: The System Security Plan, or equivalent documentation from an independent auditor, is designed and written in accordance with National Institute Standards and Technology (NIST) Special Publication (SP) , Revision 1, Guide for Developing Security Plan for Information Technology Systems; (g) Concept of Operations: A document describing the characteristics of a proposed system from the viewpoint of an individual who will use that system. It is used to communicate the quantitative and qualitative system characteristics to all stakeholders; (h) Business Justification: This document will clearly and succinctly outline the business need the cloud product or service fulfills for the Department. The justification should, where possible, reference the impacts of the product or services on overseas operations in the execution of U.S. foreign policy; 5 FAH-8 H Process for Reviewing Cloud Products a. To add a new cloud service into the Cloud Computing Service Catalog, an SO must perform the due diligence and submit a CCRP with the information prescribed in 5 FAH-8 H to the Secretariat of the CCGB. Requests for cloud products or services to be reviewed by the CCGB must be submitted via the CCRP process, as defined in the CCGB charter: (1) The Office of Information Assurance (IA) will make a recommendation to the CCGB based on the documentation submitted for review outlined in 5 FAH-8 H using an A&A framework suitable for cloud computing services. The recommendation will also be provided to the organization 5 FAH-8 H-350 Page 5 of 12
6 requesting approval; (2) Any cloud computing service that requires new software to run on a workstation (e.g., software download and installation) must follow configuration management policy to include approval by the Information Technology Configuration Control Board (IT CCB) for the workstation-based software. See 5 FAM 650 Configuration Management and 5 FAM 861 Hardware and Software Maintenance Configuration Management for more information; (3) The CCGB reviews the CCRP and IA s recommendation and issues a recommendation. The recommendation is provided to the AO and submitting organization; (4) The CCGB submits its evaluation to the AO for adjudication. The evaluation is based on criteria, such as: (a) Identifying qualifying cloud providers already approved by the CCGB that could meet the requester's requirements; (b) Recommendations for additional contract language to address risks or deviations from policy; (c) Additional mitigation actions or a Plan of Action and Milestones (POA&M) necessary to address perceived risks; (d) Additional security controls or a POA&M necessary to address perceived risks; (e) A risk analysis that balances a requested service s or product s business need with any unresolvable or unmitigated risks. b. AO Approval: Approved requests are forwarded to IRM/IA, which serves as the Department s cloud computing clearinghouse: (1) The reviewed cloud service or product receives an ATO based upon the CCRP and all other required documentation; (2) IRM s Governance, Resource, and Performance Management Office (IRM/BMP/GRP) adds the newly-approved service to the approved department catalog of cloud computing services as part of its catalog maintenance function; (3) This catalog will be integrated into the Integrated Logistics Management System (ILMS), maintained by the Bureau of Administration s Office of Logistics Management, Program Management and Policy (A/LM/PMP). For a cloud service that previously exists on the Cloud Service Catalog, A/LM will facilitate the contracting, and purchasing of the service as part of its current process (see 14 FAM 123). c. AO Denial: In the event that the AO does not approve a recommendation, the denial, at the discretion of the AO, can be sent back to the CCGB for further review to address concerns or risks cited by the AO. If issues in the denial 5 FAH-8 H-350 Page 6 of 12
7 cannot be addressed to the satisfaction of the AO, the request is denied until such time as concerns/risks can be appropriately mitigated or a POA&M can be generated to mitigate the risks. 5 FAH-8 H-352 E-GOV AND CLOUD REPORTING AND ANALYSIS (IRM/BMP/SPO/PM) 5 FAH-8 H Coordination of Cloud Reporting Requirements and E-Gov a. The Department requires SOs to determine whether a cloud computing options are appropriate, and the selection of a cloud-based solution whenever a secure, reliable, and cost-effective option exists as part of an investment Analysis of Alternatives (AoA). For detailed guidance on how to perform an AoA, please reference the E-Government (E-Gov) Program Management Office (PMO) website at the following address for the latest internal guidance on the AoA process. b. New system projects in the Department should seek to optimize cloud technology use in order to benefit from its business value. New projects should include a Cloud First compliance statement as part of the concept document to affirm their inclusion of cloud-based solutions in their AoA. c. Bureaus must ensure all cloud computing information for IT investments is accurately reported in accordance with the Office of Management and Budget (OMB) Circular A-11 the Preparation, Submission, and Execution of Budget as part of the Department s IT Capital Planning Investment Control (CPIC) process. For detailed guidance on reporting requirements, please contact the E-Gov PMO for the latest guidance. d. Investment owners must use Integrated Management Analytics, Tracking, and Resource Information Exchange (imatrix) the Department s IT portfolio management tool to report all cloud computing IT spending in their IT Investment Business Case. imatrix can be accessed via state.gov/. Training for Investment Owners and Program and Project Managers on the Department s IT Investment Business Case requirements is available from E-Gov PMO through the Foreign Service Institute (FSI) course catalog. e. Investment owners must work with asset owners to ensure cloud assets or services are entered into imatrix and designated under the appropriate asset subtype. 5 FAH-8 H-350 Page 7 of 12
8 5 FAH-8 H Cloud Computing Analysis All commercial cloud computing AoAs for IT investments must be reported as part of the Capital Planning and Investment Control (CPIC) process. When selecting applications for migration to a cloud environment, consider the following: (1) Lifecycle: If a legacy system is due to be replaced or undergo a major update within a year, a replacement system must consider a cloud solution; low risk systems must provide justification why they cannot be moved to the cloud upon refresh. This justification must be presented while seeking CCGB approval, an ATO, and during the CPIC process; (2) Mission importance: Migrate the least critical systems before missioncritical applications; (3) Information sensitivity: Cloud solutions must meet security controls per National Institute of Standards and Technology (NIST) , FedRAMP, and Department standards; (4) Complexity: Systems that are smaller or standalone (no interfaces to other systems) are prime candidates for migration; (5) Throughput or latency sensitivity: Factor user experience into the analysis when evaluating systems which are bandwidth-intensive or delay-sensitive; (6) User population: Systems that service external users (other Federal agencies, non-government organizations (NGOs), and the public) are often prime candidates for a cloud solution; (7) Costs: The analysis should document the ROI, including operational costs of cloud computing, both disclosed and hidden. Systems that realize an ROI within 3 years should be strongly considered for a cloud solution; and (8) Privacy Impact Assessment: The risk of disclosure of personally identifiable information (PII) must be considered in the use of cloud solutions. 5 FAH-8 H-353 CONTRACTING FOR CLOUD PRODUCTS AND SERVICES a. Contracting for cloud services has the opportunity to generate significant benefits for the government but also contains inherent risks. SOs and personnel initiating requisitions maintain the ultimate responsibility for ensuring the requirements of 5 FAM 1100 are met. b. Regardless of the cost of a cloud service purchase, such as falling below the micro-purchase threshold, the cloud approval policy must still be followed to 5 FAH-8 H-350 Page 8 of 12
9 ensure management of any risk associated with the purchase. c. The requesting party must clearly mark all cloud services procurements as cloud (title and description) within Ariba. d. Prior to any procurement, CCGB must approve each cloud services procurement request. The approvals must be obtained prior to submitting a requisition for procurement services. All requests for these services sent to procurement must contain a certification that the services have been approved by the AO. When the requisition is received by the procurement officials, it will be deemed as approved by all necessary officials. e. SOs electing to acquire cloud services shall use existing CCGB-approved contract vehicles to the maximum extent practicable. When existing contract vehicles do not exist, or are inappropriate, extra care shall be taken. Contract language must be added to ensure that all security, safeguards for sensitive information, and necessary access for cyber security officials are included in the vendor agreement. f. None of the above alleviates the responsibility to fulfill contracting legal requirements. g. In addition to standard FedRAMP security controls, all contracts should contain standard language that affords the Department the opportunity to implement additional controls and/or restrictions. h. The utilization of cloud services may result in data residing in a nongovernment controlled environment. Numerous items pose a threat to data when housed in this environment (i.e., natural disasters, cyber-attack, or financial stability of the third-party). Therefore, careful consideration should be given to backup and recovery. A backup and recovery strategy commensurate with the risk level of the assessed use of a cloud product, as determined by CCGB, must be included in all contracts to acquire cloud services. Unless specifically waived, contract language shall be inserted to ensure that the government maintains ownership of data residing on third-party systems, and the government has a means of obtaining this data. IRM will have lead and worked with all interested parties to define objectives for backup and recovery strategies. i. The SO must follow remediation plans as specified by AO and the risk level approved for a cloud-based service to include any contingency that could seriously impact the confidentiality, integrity, or availability of Department data or systems, such as malware infection, insider threat, or natural disaster in accordance with the guidelines given in National Institute of Science and Technology Special Publication : Contingency Planning for Information Technology Systems as standard contract language. j. For cloud services storing and processing PII, the SO must document a plan to manage the business impact of a suspected or actual unauthorized access to the information. 5 FAH-8 H-350 Page 9 of 12
10 k. Upon adoption of a government-wide standard protecting national security and privacy information, the requirement for use of the Trusted Internet Connection (TIC) program must be included as standard contract language for any procured cloud service. However, if the contractor cannot meet the TIC requirements, the contractor must notify the CCGB with an alternative solution in accordance with federal standards. The CCGB will then conduct a risk management review and make notifications as required. l. Contract language should stipulate that use of unidentified and non-vetted subcontractors is not permitted. m. Service providers shall affirm that all Department data will be stored and backed up within the legal boundaries of the United States and at no time shall the data in any form be stored outside those confines, unless approved by the CCGB. Data exchanged and stored on Department premises abroad is exempt. 5 FAH-8 H-354 CLOUD COMPUTING SECURITY 5 FAH-8 H Information Prohibited For Use In A Cloud Computing Product Or Service a. Consular Data: Data gathered for the purpose of processing requests for visa or passports. b. Personnel Records: Data gathered for the purpose of hiring, processing personnel actions, and other HR functions. c. Financial Transaction information: Systems or data related to the transfer of funds either internally or externally to the Department. d. Medical Records: Data gathered for medical clearances or for the maintenance of Department medical records. 5 FAH-8 H Cloud Security Requirements a. All cloud services that process Department of State information must be authorized or registered as appropriate, by the Department of State Authorizing Official (formerly known as Designated Approving Authority), based upon a system categorization in accordance with Federal Information Processing Standard (FIPS) 199 and registration in the Department's IT Inventory System of Record (currently imatrix). (See 5 FAM 814.) Security measures and safeguards for information will differ depending on the Federal Information Security Management Act (FISMA) classification of the information being processed in the cloud product or service. More sensitive information and 5 FAH-8 H-350 Page 10 of 12
11 systems will require more stringent review from Department cyber security and data categorization experts before they are approved for use. b. Use of cloud services to store, process, or transmit data categorized as FISMA moderate and/or include PII requires: (1) Cloud products and services that contain Department PII or Sensitive But Unclassified (SBU) information must meet the security requirements of 5 FAM 460 (Privacy Act and PII) and 12 FAM 540 (SBU Information), respectively; (2) Cloud computing technologies using software installed on OpenNet must be CCGB and ITCCB approved; (3) Commercial cloud applications/services should address the security principles (e.g., access requirements, encryption, monitoring, network communications/routing, penetration testing) outlined in the Cloud Security Principles document available on the DS/SI/CS website along with vendor specific guidance, where possible; and (4) Encryption keys must be maintained, generated and controlled in a Department data center under the control of the US Government. All implementations of cloud products above a low FISMA impact and risk level must keep data encrypted at rest and in-transit. Deviation from this encryption requirement must be approved in writing by the AO. c. In the event of an actual or suspected compromise of the commercial cloud services/application (e.g., malware, system breach), the vendor or SO must immediately contact the DS Cyber Incident Response Team (DS/SI/CS/MIRD/CIRT). The vendor or SO must report an actual or suspected PII data breach immediately by completing the PII Breach Incident Form found on the Privacy Division s Customer Center website. If unable to access the form, the user should notify DS/CIRT of cyber and PII incidents or the Privacy Division of non-cyber PII incidents. The Cyber Incident Response Team (CIRT) may be contacted at [email protected]. The Privacy Division may be contacted at [email protected]. d. Clearance Requirements for cleared Americans providing cloud services: (1) Appropriate level National Security Institute (NSI) clearances for any system containing classified data (see 12 FAM Security Clearances, for classified systems), regardless of the impact level; (2) High Risk Public Trust (HRPT) determination for users with elevated privileges, e.g., system admin, on an unclassified/sbu High Impact system; (3) Moderate Risk Public Trust (MRPT) determination for users with elevated privileges, e.g., system admin, on an unclassified/sbu Moderate Impact system; and (4) MRPT determination for users with elevated privileges, e.g., system admin, 5 FAH-8 H-350 Page 11 of 12
12 on an unclassified/sbu Low Impact system. e. The relevant cyber security offices in IRM and DS in coordination with the SO are responsible for jointly monitoring system integrity, security and ensuring overall system and network security. 5 FAH-8 H Secure Communication Between OpenNet and Cloud Providers This section outlines the high level requirements for exchange of Department data (in any form) from cloud to cloud and cloud to internal systems including OpenNet: (1) DS/SI/CS maintains detailed and evolving security specifications in their Cloud Security Principles document. The document provides guidance on how cloud communications should be secured, including encryption standards and approved means of transporting information. (2) When specifying requirements for commercial cloud services, SOs should detail with service providers the restrictions that are to be applied if exchange of Department data must be performed between different cloud platforms or with Department systems. (3) Any connection that requires exchange of data from cloud to cloud and/or cloud to Department systems is subject to review and explicit approval by IRM/IA and DS/CS to ensure compliance with current information security standards and that the connection falls within the existing ATO for the parent or host system. 5 FAH-8 H-350 Page 12 of 12
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS
5 FAM 870 NETWORKS (Office of Origin: IRM/BMP/GRP/GP) 5 FAM 871 ENTERPRISE NETWORKS (CT:IM-138; 01-18-2013) The Department currently has two enterprise networks: ClassNet and OpenNet. Only Department-issued
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
5 FAM 1060 INFORMATION ASSURANCE MANAGEMENT
5 FAM 1060 INFORMATION ASSURANCE MANAGEMENT 5 FAM 1061 GENERAL (CT:IM-141; 06-07-2013) (Office of Origin: IRM/IA) a. The Chief Information Security Officer (CISO) operates under the direction and supervision
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT 5 FAM 621 GENERAL (Office of Origin: IRM/BMP/SPO/PMD) a. The strategic importance of Information Technology (IT) to the mission of the State Department
5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT
5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT (CT:IM-92; 08-01-2007) (Office of Origin: IRM/BPC/PRG) 5 FAM 671 WHAT ARE IT PERFORMANCE MEASURES AND WHY ARE THEY REQUIRED?
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Privacy Impact Assessment (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00. Last Updated: May 1, 2015
United States Department of State (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00 Last Updated: May 1, 2015 Bureau of Administration 1. Contact Information A/GIS/IPS Director Bureau of Administration
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
5 FAM 790 USING SOCIAL MEDIA
5 FAM 791 SCOPE 5 FAM 790 USING SOCIAL MEDIA (Office of Origin: IRM/BMP/GRP) a. Social media consist of a variety of digital technologies that foster interaction among individuals who use the tools. Social
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose
Significant Revisions to OMB Circular A-127 Section Revision to A-127 Purpose of Revision Section 1. Purpose Section 5. Definitions Section 6. Policy Section 7. Service Provider Requirements Section 8.
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
FISMA Cloud GovDataHosting Service Portfolio
FISMA Cloud Advanced Government Oriented Cloud Hosting Solutions Cyber FISMA Security Cloud Information Security Management Compliance Security Compliant Disaster Recovery Hosting Application Cyber Security
DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer
DEPARTMENT OF THE INTERIOR Privacy Impact Assessment Guide Departmental Privacy Office Office of the Chief Information Officer September 30, 2014 Table of Contents INTRODUCTION... 1 Section 1.0 - What
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Office of the Chief Information Security Officer Version 10 September 16, 2013 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 200.1A Approved: SUBJECT: INFORMATION TECHNOLOGY MANAGEMENT 1. OBJECTIVES. The Department of Energy s (DOE) overarching mission, to advance the national,
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
OSAC Committees are as follows: Threats and Information Sharing; Country Council and Outreach; and Security Awareness and Innovation.
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
UNCLASSIFIED. Rules of Behavior Department of State SharePoint System (DOSSS) Internet DMZ
Rules of Behavior Department of State SharePoint System (DOSSS) Internet DMZ Version 1.0 January 30, 2012 Prepared By: Systems & Integration Office (SIO) IRM/OPS/SIO/CCS Author: Distribution: Document
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Privacy Impact Assessment (PIA)
Privacy Impact Assessment (PIA) 1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
OPM System Development Life Cycle Policy and Standards. Table of Contents
Table of Contents 1. INTRODUCTION... 4 1.1 Purpose... 4 1.1.1 OPM SDLC Policy... 4 1.1.2 Key Concepts and Principles... 4 1.2 Scope and Applicability... 5 1.3 Compliance, Enforcement and Exceptions...
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
The IMS System - Overview and Brief Description
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Information Sharing Services Office of Information Programs and Services 2. System Information
15 FAM 1000 CAPITAL CONSTRUCTION AND MAJOR REHABILITATION PROJECTS
15 FAM 1000 CAPITAL CONSTRUCTION AND MAJOR REHABILITATION PROJECTS 15 FAM 1010 SCOPE AND POLICY (Office of Origin: OBO) 15 FAM 1011 SCOPE AND APPLICABILITY The provisions of this subchapter pertain to
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
SMSe Privacy Impact Assessment
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS. Section 40.1. Purpose
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS Section 40.1. Purpose... 1 Section 40.2. Background... 2 Section 40.3. Scope and Applicability... 3
2.0 ROLES AND RESPONSIBILITIES
2.0 ROLES AND RESPONSIBILITIES This handout describes applicable roles and responsibilities for the Capital Planning and Investment Process (CPIC) as presented in the NIST Integrating IT Security into
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Checklist to Assess Security in IT Contracts
Checklist to Assess Security in IT Contracts Federal Agencies that outsource or contract IT services or solutions must determine if security is adequate in existing and new contracts. Executive Summary
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
