SECRETARY OF THE ARMY WASHINGTON



Similar documents
Comprehensive Soldier and Family Fitness Directive

SUBJECT: Privileged Access to Army Information Systems and Networks. a. Army Regulation (AR) 25-2, Information Assurance (IA), 23 March 2009.

SUBJECT: Army Information Technology Service Management (ITSM) Policy

OPERATIONS IN SOMALIA CAMPAIGN PARTICIPATION CREDIT

The Cost and Economic Analysis Program

Army Regulation Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED

MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems


Army Foundry Intelligence Training Program

Followup Audit: Enterprise Blood Management System Not Ready for Full Deployment

Department of Defense INSTRUCTION. 1. PURPOSE. In accordance with DoD Directive (DoDD) (Reference (a)), this Instruction:

Accelerate your mission with GTSI Integration Services

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 2 NAVY ANNEX WASHINGTON, DC MCO LPP 12 May 97

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION

DoD s Efforts to Consolidate Data Centers Need Improvement


Funding Invoices to Expedite the Closure of Contracts Before Transitioning to a New DoD Payment System (D )

National Guard Interaction with State Defense Forces

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY

Management of Army Business Operations

Audit of IT Asset Management Report

Army Force Generation

Department of Defense INSTRUCTION

April 17, Human Capital. Report on the DoD Acquisition Workforce Count (D ) Department of Defense Office of Inspector General

Department of Defense INSTRUCTION

AUSA HOT TOPICS. Army Networks and Cyber Security in Force 2025 FINAL AGENDA 12 JUNE Crystal Gateway Marriott Arlington, Virginia

Subj: NAVY MEDICINE DATA QUALITY MANAGEMENT CONTROL PROGRAM

Department of Defense INSTRUCTION

Report No. D February 5, Contingency Planning for DoD Mission-Critical Information Systems

Department of Defense INSTRUCTION

Report No. D September 21, Sanitization and Disposal of Excess Information Technology Equipment

Department of Defense MANUAL. DoD Integrated Materiel Management (IMM) for Consumable Items: Operating Procedures for Item Management Coding (IMC)

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. Policy on Graduate Education for Military Officers

Department of Defense. SUBJECT: Settling Personnel and General Claims and Processing Advance Decision Requests

OPNAVINST N00 4 Jun 2012

17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT # POSITION: IT Specialist (CUSTSPT) (D ) (GS /09) EXCEPTED POSITION

Department of Defense INSTRUCTION

a GAO GAO DEFENSE WORKING CAPITAL FUND Military Services Did Not Calculate and Report Carryover Amounts Correctly

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION. Presidential Recognition on Retirement from Military Service

Palantir Software Enterprise Software Agreement. Blanket Purchase Agreement (BPA) N A-ZF34. (Approved 5/21/15) (Approved

The National Security Act of 1947 July 26, 1947

Department of Defense INSTRUCTION

Acquisition. Army Claims Service Military Interdepartmental Purchase Requests (D ) June 19, 2002

(a) In General.--(1) Chapter 131 of title 10, United States Code, is amended by inserting before section 2223 the following new section:

Encl: (1) Surface Warfare Tactical Requirement Group Membership

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

DEFENSE LOGISTICS AGENCY HEADQUARTERS CAMERON STATION ALEXANDRIA, VA 22314

Department of Defense INSTRUCTION

DOD DIRECTIVE CLIMATE CHANGE ADAPTATION AND RESILIENCE

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

OPERATIONAL CONTRACT SUPPORT

Department of Defense INSTRUCTION

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED

Department of Defense INSTRUCTION

ARMY COURSE CATALOG INTRODUCTION (SI)

UNITED STATES ARMY MATERIEL COMMAND

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

DEPARTMENT OF THE ARMY Office of the Chief of Chaplains 2700 Army Pentagon Washington DC

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

MHS Health Information Technology Transformation March 1, 2016

Department of Defense INSTRUCTION

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

RIVERSIDE SCHOOL DISTRICT NO. 2 FIXED ASSETS PROCEDURES MANUAL

Cybersecurity: The Defense Perspective

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Thanks

CHAPTER 169. MILITARY CONSTRUCTION AND MILITARY FAMILY HOUSING

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 7 Jan 15

Department of Defense DIRECTIVE

Army Publishing Program

Subj: NAVAL SPECIAL WARFARE OFFICER CONTINUATION PAY PROGRAM

The Army Records Information Management System (ARIMS)

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

How To Write A Defense Department Adoption Reimbursement Policy

U.S. Department of Education. Office of the Chief Information Officer

Department of Defense INSTRUCTION

OPNAVINST A N4 5 Jun Subj: OPERATING MATERIALS AND SUPPLIES AND GOVERNMENT FURNISHED MATERIAL MANAGEMENT

TITLE III INFORMATION SECURITY

Department of Defense INSTRUCTION. SUBJECT: Fellowships, Scholarships, Training With Industry (TWI), and Grants for DoD Personnel

Transcription:

SECRETARY OF THE ARMY WASHINGTON 2 2 JUN 2016 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2016-18 (Divesting Legacy Information Technology Hardware, Software, and Services in Support of the Army Network) 1. The Army is aggressively modernizing its enterprise network to improve network operations and delivery of services while increasing security and reducing the total cost of ownership. Critical to this effort is the elimination of legacy information technology (IT) hardware, software, and services. Legacy IT is IT that has no functional benefit to the Army's network upon delivery of modernized technology. Legacy IT includes duplicate networks, equipment replaced during integration with the Joint Information Environment, unnecessary and unused software, and IT services that no longer fulfill a requirement. Elimination of costs associated with operating and maintaining unnecessary legacy IT will increase resources available to operate the modernized network. 2. Effective immediately, all Army commands, organizations, and activities will implement the policy detailed in enclosure 1. A list of applicable references is in enclosure 2. 3. This directive applies to the Active Army, Army National Guard/Army National Guard of the United States, and U.S. Army Reserve. 4. The Army Chief Information Officer/G-6 is the proponent for the policy in this directive and will incorporate the policy into the next iteration of Army Regulation 25-1 (Army Information Technology). 5. This directive is rescinded upon issuance of the final administrative publication. Encls j2 (~, Eric K. FVn,,~ DISTRIBUTION: Principal Officials Headquarters, Department of the Army Commander U.S. Army Forces Command U.S. Army Training and Doctrine Command U.S. Army Materiel Command U.S. Army Pacific (CONT)

SUBJECT: Army Directive 2016-18 (Divesting Legacy Information Technology Hardware, Software, and Services in Support of the Army Network) DISTRIBUTION: (CONT) U.S. Army Pacific U.S. Army Europe U.S. Army Central U.S. Army North U.S. Army South U.S. Army Africa/Southern European Task Force U.S. Army Special Operations Command Military Surface Deployment and Distribution Command U.S. Army Space and Missile Defense Command/Army Strategic Command U.S. Army Medical Command U.S. Army Intelligence and Security Command U.S. Army Criminal Investigation Command U.S. Army Corps of Engineers U.S. Army Military District of Washington U.S. Army Test and Evaluation Command U.S. Army Installation Management Command Superintendent, United States Military Academy Director, U.S. Army Acquisition Support Center Executive Director, Arlington National Cemetery Commander, U.S. Army Accessions Support Brigade Commandant, U.S. Army War College Commander, Second Army CF: Director, Army National Guard Director of Business Transformation Commander, Eighth Army Commander, U.S. Army Cyber Command 2

DIVESTING LEGACY INFORMATION TECHNOLOGY HARDWARE, SOFTWARE, AND SERVICES IN SUPPORT OF THE ARMY NETWORK 1. Purpose. This directive provides guidance to all Army organizations for the elimination of legacy information technology (IT) hardware, software, and services. 2. Background. In support of the Army Network Campaign Plan, the Army is aggressively modernizing the enterprise network to improve network operations and service delivery while increasing security and reducing the total cost of ownership. Critical to this effort is the elimination of legacy IT hardware, software, and services. As defined by this policy, legacy IT is not identified based on time since certification to operate on the network (see reference a). Instead, legacy IT is IT that has no functional benefit to the Army's network because the adoption of modernized technology has made it obsolete. Legacy IT includes duplicate networks, equipment replaced during integration with the Joint Information Environment, unnecessary and unused software, and IT services that no longer fulfill a requirement. Elimination of costs associated with operating and maintaining unnecessary legacy IT will increase resources available to operate the modernized network. 3. Scope. This policy applies to: a. the Active Army, Army National Guard/Army National Guard of the United States, and U.S. Army Reserve. b. all Army IT networks and IT infrastructure (computing systems, servers, transport circuits, switches, routers, software (including applications), supporting IT hardware and software licenses and services, operations, and maintenance contracts). 4. Policy. All Army senior IT leaders (typically, the command G-6 or network enterprise center director) will review their networks and enclaves to implement the following tasks. a. Divest legacy IT equipment as it is replaced by new IT equipment and associated capabilities. Review the approved and removed products lists at the Defense Information Systems Agency's Approved Products List Tracking System Web site (https://aplits.disa.mil) to ensure that any new IT equipment is approved for use. Decommission unnecessary switches and routers. b. Ensure that the divestiture of IT equipment aligns with the Army's implementation of black core network architecture for modernization to multiprotocol label switching. Decommission post, camp, and station enclaves when multiprotocol label switching black core architecture is available for use. c. Terminate contracts for legacy hardware, software, or IT services that are no longer in use or that updated versions have replaced. To prevent unnecessary Army Directive 2016-18 Enclosure 1

expenses related to contract terminations, ensure that the cost of early termination does not exceed the cost of continuing the contract through its expiration date. d. Make sure contract option years are not exercised for IT hardware, software, or services no longer in use. e. Ensure that hardware and software from existing contracts continue to meet current cybersecurity requirements and comply with Security Technical Implementation Guides for the duration of their use. f. Verify that operation and maintenance costs are not being paid on unused hardware or software, including applications and circuits. g. Ensure that divested equipment is removed from corporate databases and contracts that support the equipment. h. Delete the divested equipment from the Army Portfolio Management Solution database. I. Dispose of unused equipment above the level the command established for contingency stock (inventory held to meet ad hoc requirements or unexpected demand) or transfer the equipment to a location of need, as long as the equipment is deemed necessary in accordance with paragraph 4a of this enclosure and meets security standards established in Army Regulation 25-2, Department of the Army Pamphlet 25-1-1, and related IT security documents. j. Make sure procedures for disposition and data sanitization of IT follow the requirements in Army Regulation 25-2, Department of the Army Pamphlet 25-1-1, and applicable cybersecurity best business practices available at https://tiny.army.mil/rftiwgg/milsuitelabbps. k. Obtain and follow official disposition instructions from the Defense Logistics Agency as appropriate (go to http://www.dispositionservices.dla.mil). 5. Compliance. In accordance with AR 25-1, Army organizations will ensure that all IT is accounted for in the Army Portfolio Management Solution (APMS), the Army's authoritative data source for IT. Commands are responsible for validating and updating IT investments and expenses in APMS each fiscal quarter as the divestiture of IT proceeds. The Office of the Chief Information Officer/G-6 will track the divestiture of Army IT via APMS data trends. 6. Review. No later than 1 June 2016, the Chief Information Officer/G-6 will review this guidance for the inclusion of appropriate content in the next update of AR 25-1. Army Directive 2016-18 2 Enclosure 1

7. Points of Contact. a. For policy questions, contact the CIO/G-6 Policy lnbox at usarmy.pentagon.hqdacio-g-6.mbx.policy-inbox@mail.mil. b. For use of APMS, contact the APMS Help Desk at usarmy.apg.cecom.mbx.aitr-help. Army Directive 2016-18 3 Enclosure 1

REFERENCES a. Title 10, U.S. Code, Armed Forces, Section 2222(e)(2). b. Army Regulation 25-1 (Army Information Technology), 25 June 2013. c. Army Regulation 25-2 (Information Assurance), 24 October 2007, Including Rapid Action Revision Issued 23 March 2009. d. Department of the Army Pamphlet 25-1-1 (Army Information Technology Implementation Instructions), 26 September 2014. e. Headquarters, Department of the Army Chief Information Officer/G-6, Army Network Campaign Plan: 2020 & Beyond, February 2015. Army Directive 2016-18 Enclosure 2