Views
5 years ago

Defense Security Service - Florida Industrial Security Working Group

Defense Security Service - Florida Industrial Security Working Group

Defense Security Service - Florida Industrial Security Working

Defense Security Service Office of the Designated Approving Authority (ODAA) Process Guide For Certification and Accreditation Of Classified Systems under the National Industrial Security Program Operating Manual (NISPOM) Revised May, 2008 Revision 2008.1

  • Page 2 and 3: Title Page Document Name: ODAA Proc
  • Page 4 and 5: Appendix I Mobile Information Syste
  • Page 6 and 7: 1.0 Introduction The Director, DSS
  • Page 8 and 9: • IS Reps through the C&A Reviewe
  • Page 10 and 11: o Restricted area • Operating sys
  • Page 12 and 13: DSS. All signatories below the gene
  • Page 14 and 15: • The ISSP/C&A Reviewer will vali
  • Page 16 and 17: 2.3.4.2 Mobile Systems Systems accr
  • Page 18 and 19: 2.4.3 Voice Over IP/Video Teleconfe
  • Page 20 and 21: approving the Contractor’s Plan o
  • Page 22 and 23: Glossary Accreditation Formal decla
  • Page 24 and 25: Interim Approval to Temporary appro
  • Page 26 and 27: The C&A Reviewer will be required t
  • Page 28 and 29: individual located at the host site
  • Page 30 and 31: Information Systems Security Profes
  • Page 32 and 33: IS technical features exceeds the c
  • Page 34 and 35: Facility Security Officer (FSO) sep
  • Page 36 and 37: 2. Upon completion of the course(s)
  • Page 38 and 39: TAB A Figure B-1: Enclosure 47: C&A
  • Page 40 and 41: Person Evaluated: Credential #: Fie
  • Page 42 and 43: CR-26 Did the ISR ensure the contra
  • Page 44 and 45: Person Evaluated: Credential #: Fie
  • Page 46 and 47: CR-17 CR-18 CR-19 CR-20 CR-21 CR-22
  • Page 48 and 49: TAB C INFORMATION SYSTEM SECURITY R
  • Page 50 and 51: Appendix C Special Categories (NISP
  • Page 52 and 53:

    Appendix D Certification and Accred

  • Page 54 and 55:

    to the RDAA, ISSP (if different fro

  • Page 56 and 57:

    After the on-site validation, the I

  • Page 58 and 59:

    copy to the ISSP and IS Rep stating

  • Page 60 and 61:

    ISSM completes new MSSP or SSP Emai

  • Page 62 and 63:

    Enclosure 27 - IS Security Plan and

  • Page 64 and 65:

    cleared and those that are uncleare

  • Page 66 and 67:

    I&A 1 (PL 1) 8-607a. Are uses uniqu

  • Page 68 and 69:

    Section 7. Interconnected Systems 8

  • Page 70 and 71:

    Please update the Master System Sec

  • Page 72 and 73:

    ISSP ACCREDITATION STATEMENT: _ _ I

  • Page 74 and 75:

    Appendix E System Security Plans Pl

  • Page 76 and 77:

    Table E-1 Subject Line Requirements

  • Page 78 and 79:

    4. 5. IS Rep Name: ISSP Name: ISSM

  • Page 80 and 81:

    ISSM Email Validation It is extreme

  • Page 82 and 83:

    shall be retained for 2 years from

  • Page 84 and 85:

    1. The host contractor will prepare

  • Page 86 and 87:

    Once the submitted plan is received

  • Page 88 and 89:

    Secret LAN in a restricted area Sec

  • Page 90 and 91:

    • Copy of the MSSP Accreditation

  • Page 92 and 93:

    Once approved, the procedures and D

  • Page 94 and 95:

    Withdrawal of self-certification au

  • Page 96 and 97:

    security requirements. Certificatio

  • Page 98 and 99:

    Table F-2 MSSP IS Tracking Form MSS

  • Page 100 and 101:

    3) Point Of Contact (POC) informati

  • Page 102 and 103:

    7) Network ISSO provides each node

  • Page 104 and 105:

    WAN connection. Therefore, all NTK

  • Page 106 and 107:

    Changes in Status - From IATO to AT

  • Page 108 and 109:

    for all systems involved. An NSP sh

  • Page 110 and 111:

    Rel 2, dated 10 March 2008 at: http

  • Page 112 and 113:

    Overall Network Security Profile (T

  • Page 114 and 115:

    Node A Workstation Personal Compute

  • Page 116 and 117:

    Network Host Security Profile (To b

  • Page 118 and 119:

    Network Node Security Profile (To b

  • Page 120 and 121:

    or User Agency Name at different en

  • Page 122 and 123:

    Memorandum of Understanding (Signat

  • Page 124 and 125:

    unclassified wire lines. Within a c

  • Page 126 and 127:

    PDS Security Plan Revision Log By s

  • Page 128 and 129:

    Protected Distribution System Appro

  • Page 130 and 131:

    Appendix I Mobile Information Syste

  • Page 132 and 133:

    Additional Requirements for relocat

  • Page 134 and 135:

    Offsite Processing When equipment i

  • Page 136 and 137:

    [Facility Information] System/Compo

  • Page 138 and 139:

    [Facility Information] System/Compo

  • Page 140 and 141:

    A. Introduction This plan outlines

  • Page 142 and 143:

    Letter 16 - Letter Acknowledging Re

  • Page 144 and 145:

    Letter 16 - Letter Acknowledging Re

  • Page 146 and 147:

    Appendix J International System Sec

  • Page 148 and 149:

    3. If the request is complete, copi

  • Page 150 and 151:

    Appendix L Tactical, Embedded, Data

  • Page 152 and 153:

    The contractor emails/mails the com

  • Page 154 and 155:

    Appendix N Trusted Download Procedu

  • Page 156 and 157:

    information outside the IS may take

  • Page 158 and 159:

    *Note: Executable programs may not

  • Page 160 and 161:

    6. If any files are not in one of t

  • Page 162 and 163:

    DSS Authorized Procedure (Unix) Not

  • Page 164 and 165:

    Figure N-1 Trusted Download Authori

  • Page 166 and 167:

    [Contractor Name] [Address] SUBJECT

  • Page 168 and 169:

    Appendix O Clearing/Sanitization Cl

  • Page 170 and 171:

    ead the programming language in whi

  • Page 172 and 173:

    (Updated March 21, 2008) NISPOM par

  • Page 174 and 175:

    INSTRUCTIONS FOR READING THE MATRIX

  • Page 176 and 177:

    Appendix P Voice Over IP/Video Tele

  • Page 178 and 179:

    Appendix R Metrics (Will be include

  • Page 180 and 181:

    4. Is SSP readily available to all

  • Page 182 and 183:

    • Determine if, as is required, a

  • Page 184 and 185:

    destruction. NIST Special Publicati

  • Page 186 and 187:

    • Immediately communicate to each

  • Page 188 and 189:

    Security Incident Response Procedur

  • Page 190 and 191:

    Figure U-2 Microsoft Exchange Serve

  • Page 192 and 193:

    Check Box Step ID B13 As necessary,

  • Page 194 and 195:

    Figure U-3 Novell GroupWise Server

  • Page 196 and 197:

    Check Box Step ID C11 As a GroupWis

  • Page 198 and 199:

    Figure U-4 Desktop Client Workstati

Self-Inspection Handbook - Florida Industrial Security Working Group
JOINT ARMAMENTS - National Defense Industrial Association
Social Security Numbers For Children - Florida Department of Health
Managed Security Services Market Size 2016-2026
Yearly Report of the Würth Industrial Network - Service Supply
B100-04009 Service Centers Brochure - Cooper Industries
Process Plant Overhauls - Bilfinger Berger Industrial Services
RDML Simpson - National Defense Industrial Association
DISA Contracts Guide PDF - KMI Media Group
Fall, 2009 - Industrial & Systems Engineering - University of Florida
Cindy E. Moran - Defense Information Systems Agency
DSS ACCESS, Volume 1, Issue 3 - Defense Security Service (DSS)
DISA Contracts Guide 2008 (Issue 12.4) - KMI Media Group
Industrial IT services - MATERNA GmbH
Automation US_NEU2.indd - is Industrial Services
Ontario Public Service Contractor Security Screening (PDF)
Mapping security services to authentication levels - Enisa - Europa
May 7-10, 2012 - Defense Information Systems Agency
The Secure Connection. - addamegh group of companies
INDUSTRIAL INNOVATION Working Group (NILI) - National ...
Stock Exchange Listing Services - Specialist Securities - Carey Group
Mechanical Engineering - is Industrial Services
Rules and Guidelines IV Industrial Services 14 Guideline ... - GL Group
Manufacturing & Industrial Brochure - AlliedBarton Security Services
Maritime Services Directory 2013 - SuperYacht Industry
Lean Study 2008 Nordic service industry - Cordial
SECURITY INDUSTRY - Ministerium für Wirtschaft und ...