1 year ago

Department of Defense INSTRUCTION


DoDI 5000.02, January 7,

DoDI 5000.02, January 7, 2015 ENCLOSURE 11 REQUIREMENTS APPLICABLE TO ALL PROGRAMS CONTAINING INFORMATION TECHNOLOGY (IT) 1. PURPOSE. This enclosure identifies the additional policy and procedure that apply to all programs containing IT, including National Security Systems (NSS). 2. APPLICABILITY. This enclosure applies to: a. IT, as defined in title 40 of U.S. Code (Reference (p)), is any equipment or interconnected system or subsystem of equipment, used in the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information; includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including support services, and related resources). IT is equipment used by the DoD directly or is used by a contractor under a contract with the DoD that requires the use of that equipment. IT does not include any equipment acquired by a federal contractor incidental to a federal contract. b. NSS, as defined in the Federal Information Security Management Act of 2002, 44 U.S.C. 3541, et seq. 44 U.S.C. 3552 (Reference (aw)), are telecommunications or information systems operated by or on behalf of the Federal Government, the function, operation, or use of which involves intelligence activities, cryptologic activities related to national security, command and control of military forces, equipment that is an integral part of a weapon or weapons system, or, is critical to the direct fulfillment of military or intelligence missions. NSS do not include systems that are used for routine administrative and business applications (including payroll, finance, and personnel management applications). c. Information systems, as defined in title 44 of U.S. Code 44 U.S.C. 3502 (Reference (aw)), are a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. 3. CLINGER-COHEN ACT (CCA) COMPLIANCE. Subtitle III of title 40 of U.S. Code (Reference (p)) (formerly known as Division E of CCA) (hereinafter referred to as “CCA”) applies to all IT investments, including NSS. a. For all programs that acquire IT, including NSS, at any acquisition category (ACAT) level, the Milestone Decision Authority (MDA) will not initiate a program nor an increment of a program, or approve entry into any phase of the acquisition process that requires formal acquisition milestone approval, and the DoD Component will not award a contract for the applicable acquisition phase until: Change 2, 02/02/2017 148 ENCLOSURE 11

DoDI 5000.02, January 7, 2015 (1) The sponsoring DoD Component or program manager has satisfied the applicable acquisition phase-specific requirements of the CCA as shown in Table 9 10 in Enclosure 1 of this instruction; and (2) The Program Manager has reported CCA compliance to the MDA and the DoD Component Chief Information Officer (CIO), or their designee. b. The Component CIO, or their designee, will record the CCA compliance in the DoD Information Technology Portfolio Repository upon program initiation and at subsequent major decision points, and in the Acquisition Information Repository, as required. c b. Table 9 10 in Enclosure 1 of this instruction identifies the specific requirements for CCA compliance. These requirements will be satisfied to the maximum extent practicable through documentation developed under the Joint Capabilities Integration and Development System JCIDS and the Defense Acquisition System. To report compliance, the Program Manager will prepare a table similar to Table 9 10 to indicate which documents demonstrate compliance with the CCA requirements. The Program Manager’s table will provide links to the cited documents and serve as Program Manager’s “CCA Compliance Report.” 4. POST IMPLEMENTATION REVIEW (PIR). The functional sponsor, in coordination with the Component CIO and Program Manager, is responsible for developing a plan and conducting a PIR for all fully deployed IT, including NSS. PIRs will report the degree to which doctrine, organization, training, materiel, leadership and education, personnel, facilities, and policy changes have achieved the established measures of effectiveness for the desired capability; evaluate systems to ensure positive return on investment and decide whether continuation, modification, or termination of the systems is necessary to meet mission requirements; and document lessons learned from the PIR. If the PIR overlaps with Follow-on Operational Test and Evaluation, the sponsor should coordinate planning of both events for efficiency. The preparation of the TEMP and the MDA’s decision to proceed with full-rate production satisfy the requirement for weapons systems. The post fielding assessment(s), the disposition assessment, and the disposition decision for an urgent need (as described in Enclosure 13), meet the requirement for a PIR. 5. DOD INFORMATION ENTERPRISE ARCHITECTURE. The DoD Information Enterprise Architecture will underpin all information architecture development to realize the Joint Information Environment. Program Managers must develop solution architectures that comply with the DoD Information Enterprise Architecture, applicable mission area and component architectures, and DoD Component architecture guidance. A program’s solution architecture should define capability and interoperability requirements, establish and enforce standards, and guide security and cybersecurity requirements. The standards used to form the Standard Viewpoints of integrated architectures will be selected from those contained in the current approved version of the DoD IT Standards Registry within the Global Information Grid Technical Guidance Federation service (Reference (br)). The IT will be tested to measures of performance derived from the solution architecture. Change 2, 02/02/2017 149 ENCLOSURE 11

joint program management handbook - Defense Acquisition University
OVERVIEW W - Office of the Under Secretary of Defense (Comptroller)
Joint Pub 6-02 - United States Department of Defense
Department of Defense (DoD) Information Enterprise Strategic Plan
USAF ILA Handbook - ACC Practice Center - Defense Acquisition ...
Navy Cyber Power 2020 - Defense Innovation Marketplace
JP 4-02 Health Service Support - DMRTI - Defense Medical ...
Quadrennial Defense Review (QDR) - United States Department of ...
Department of Defense Nonlethal Weapons and Equipment Review
COL Mike Zarbo - PEO STRI - U.S. Army
department of defense more disciplined use of resources
Space Acquisition - Air Force Space Command
Developing Operational Requirements - U.S. Department of ...
Volume 5, Number 1 - Space and Missile Defense Command - U.S. ...
JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
Mission: Possible - Chief Information Officer
Joint Service Chemical & Biological Defense Program Overview ...
COL Michael Flanagan - PEO STRI - U.S. Army
Department of Defense Nonlethal Weapons and Equipment Review
Download - Vol 6 No 1 - IAC - Defense Technical Information Center
Army - National Training and Simulation Association