Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) August 2010.

Slides:



Advertisements
Similar presentations
For Security Professionals
Advertisements

CIP Cyber Security – Security Management Controls
1 Beyond Standards. Standards ISFO Manual Threats Case Study Future 2 Beyond Standards.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
ODAA Workshop December 2012 Charles Duchesne, DSS Tiffany Snyder, DSS
What’s the path to a SSP? Information System Profile Contractor: Lockheed Martin, Missiles and Fire Control Address: 1701 W. Marshall Dr. Grand Prairie,
1 Office of the Designated Approving Authority (ODAA) April 2008.
ISFO – ODAA Defense Security Service Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) Nov Nov 2013.
SITS:Vision Annual the Hilton Deansgate Hotel, Manchester Mike Fisher – Technical Services Team Leader Security and Hosting July 2011.
DoD Information Assurance Certification and Accreditation Process (DIACAP) August 2011.
PROCESSING YOUR THESIS Distance Learning Students Thesis Processing Office of the Dean of Research Naval Postgraduate School 1.
Lesson 17: Configuring Security Policies
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Public Vouchers Further information is available in the Information for Contractors Manual under Enclosure 5 The views expressed in this presentation are.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Slide 1 of 28 Welcome to GSA’s Vendor and Customer Self Service (VCSS) course Section 2: VCSS Account Registration & Requesting Access This presentation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
ODAA Update Agenda ODAA Business Management System (OBMS) Deployment
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Florida Industrial Security Workgroup Self-Inspections What are Self-Inspections Why should Self-Inspections be conducted When should Self-Inspections.
Welcome to the Manage Quality Assurance module of the “MIP Release 3 Study Workflow Training” course! This module guides you through the process of managing.
Submitting Book Chapters via Manuscript Central A Short Guide for Wiley-VCH Authors.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Module 2: Managing User and Computer Accounts
CPMT 1449 Computer Networking Technology – Lesson 1
Contractor SIPRNet Process
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
DIRECT CERTIFICATION Patricia Winders Director’s Conference July 29, 2015.
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
GFP in the IUID Registry – A Basic Look Walt Clark, CPPM Raytheon IIS.
By: Carol Martineau, Acting Assistant Manager, Aircraft Maintenance Division, AFS-301 Date: June 7, 2015 Federal Aviation Administration ASA Conference.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
1 Conservation Transaction Plug-In (CTP) Tool Overview March 23 & 25, 2010 Tim Pilkowski State Conservation Agronomist Annapolis, MD USDA is an equal opportunity.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
MP Online Data Entry Project Update WMS / ROS August 2013 Troy Anderson.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 2: Managing User and Computer Accounts. Overview Creating User Accounts Creating Computer Accounts Modifying User and Computer Account Properties.
Grade Change & Incompletes Policy/ Procedure Auburn University Office of the Provost.
Moveable Equipment Inventory Brown Bag February 11, 2009 Bob Marchitto Manager, Moveable Equipment Inventory ,
Jewuan Davis DSN Voice Connection Approval Office 18 May 2006 DSN Connection Approval Process (CAP)
Training by the Office of Library and Information Services Contact for more information: karen.gardner- or
Washington, DC December 6, 2006 Formula and Process for Nonbeverage Product (TTB F ) – Briefing for Automated Form Completion.
Defense Security Service Contractor SIPRNet Process June 2013
0 Electronic Subcontracting Reporting System (eSRS) Department of Defense Government Training Submitting a SSR – Commercial Plan.
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
American Diploma Project Administrative Site Training.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
ISSM 101 Break-Out Session
Information Exchange under the DLMS SDR Transformation Initiative, DoD WebSDR, & Item Unique Identification (IUID) SDR Committee Meeting, Dec 6, 2006.
Payment Card Industry (PCI) Rules and Standards
Defense Security Service
Defense Security Service Risk Management Framework (RMF)
Defense Security Service Risk Management Framework (RMF)
AEGIS Certification Authority
Field Inventory Services-Sanofi Inventory and Audit Training
Josh Thompson Classified Information Systems – Western Region
The Organized FSO Getting Control of the Paperwork and the Chaos
Defense Security Service Risk Management Framework (RMF)
USOAP Continuous Monitoring Approach (CMA) Workshop
CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
To the ETS – Encumbrance Online Training Course
To the ETS – Encumbrance Online Training Course
Defense Security Service Top 10 Vulnerabilities
Presentation transcript:

Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) August 2010

Overview ODAA Documentation ISFO Process Manual (August 2010) Certification & Accreditation (C&A) Common Errors/Findings

ODAA Documentation NISPOM (Chapter 8) (February 2006) Industrial Security Letters (ISLs) ISFO Process Manual (August 2010) ISL 2007-01 ISL 2009-01 DSS ODAA Baseline Standards (March 2009) NISP Tool for Windows Version 3.5.1 (March 2010) System Security Plan (SSP) Templates (August 2009) Network Security Plan (NSP) Template (November 2008)

ISFO Process Manual System Security Plans (SSP) Types Standalone Local Area Network (LAN) Wide Area Network (WAN) Network Security Plan (NSP)

ISFO Process Manual Stand Alone Single User Stand Alone (SUSA) Only one general user Physical security Closed area Restricted area Classification level Multi User Stand Alone (MUSA) Two or more general users

ISFO Process Manual Local Area Network (LAN) Peer to peer Local user authentication Closed area Restricted area Classification level Domain controlled Central user authentication

ISFO Process Manual Wide Area Network (WAN) Unified WAN RDAA of host node will accredit IATO not allowed Single unified network SSP Must include all nodes on the unified network Interconnected WAN Separately accredited systems Network Security Plan (NSP) IATO may be issued

ISFO Process Manual Network Security Plan (NSP) Allows interconnection of separately accredited systems ATO/IATO will list nodes approved for connection Provides overall network view RDAA of host node will accredit Network ISSO is responsible An NSP must be written for any interconnection between two or more separately accredited information systems including two or more systems owned by the same ISSM at the same facility or campus (cage code.)

ISFO Process Manual Self Certification Authority granted in MSSP/Profile, Approval to Operate (ATO) Allows ISSM to self certify like systems Specific to system type and similar operations Only systems that are NISPOM compliant may be self certified Documentation for self certified systems Notify IS Rep, ISSP and ODAA An IS Profile under an MSSP is written for a system type (Single-User Non-networked, Multiuser Non-networked and Peer to Peer LAN, or Domain Controlled LAN) and similar operations (Trusted Downloads, Periods Processing, Mobile System, etc). Each IS Profile must be accredited by the CSA before the ISSM can self-certify a similar system. Master plans will not be written for any system requiring a variance or waiver. Only those systems that are NISPOM compliant may be self-certified.

Self Certification Issues NISPOM 8-202g, ISL 2007-01 Item 14, ISFO Process Manual Appendix F MSSP vs. SSP What can be self certified? Expiration or cancelation of the MSSP profile Submitting self certified paperwork to ODAA Self certified documentation not maintained with the system MSSP Tracking Forms What cannot be self certified Profiles with variance to NISP Requirements Profiles accredited prior to the release of ISL 2009-01

Certification & Accreditation (C&A) Plan Submission Must use approved SSP/MSSP/NSP templates Assign Unique Identifier (UID) Once assigned, UIDs never change Email to ODAA CC ODAA, IS Rep and ISSP Email subject line Email body

PLAN Unique Identifier Table E-1 Subject Line Requirements for Plan Submissions Region PLAN Unique Identifier IS # Identifier Variables XXXXX-YYYYMMDD-XXXXX Capital Northern Southern Western CageCode¹ YYYYMMDD² XXXXX³ XXXXX4 See Variables Unique Identifiers ¹ Use the facility's 5 character Cage Code ² Use the date on the SSP or MSSP ³ Use a number from 00001 - 99999. Each plan must use a unique number. 4 Variables MSSP Use MSSP when the plan is a Master Security Plan REV Use Rev when the plan has been resubmitted after the Contractor has made revisions as required by the ODAA. SIPR Use when the IS seeking accreditation has a connection to the SIPRNet. TERM Use when the IS is no longer used for classified processing INT Use INT for SSPs with International connections NSP Use NSP for Network Security Plans DIB Use DIB for DIBCS System Security Plans

Certification & Accreditation (C&A) Process Email plan to ODAA ODAA accepts or rejects plan Once accepted, ISSP performs desktop review RDAA can deny or issue IATO If required ISSM resubmits corrections ISSP will perform on site verification RDAA issues ATO

C&A Common Errors Missing or incomplete UID Not using approved DSS templates Missing signed IS Security Package Submission and Certification Statement Missing signed DSS Form 147 Missing ISSM System Certification Test Checklist Missing GCA risk acceptance letter for variances Missing MOU if required Missing published and promulgated IS Security Policy addressing the classified processing environment ISSM fails to submit required corrections

Common Errors Passwords SSPs not properly updated (Hardware list, software list, configuration diagram not accurate) Changing the security posture of the system without authorization Built-in admin password set never to expire BIOS Password not set Test Equipment with an operating system not included in a plan System audit review not being conducted on a weekly basis Weekly audit review not conducted during long holiday periods Dormant procedures implemented without authorization

Audit Issues References: NISPOM 8-602, ISL 2007-01 items 44 & 45 Security Relevant Objects (SRO), file, and folder permission & auditing System auditing Operating system executables Operating system configuration System management and maintenance executables Audit data/Audit review logs Security related software (Anti Virus, System/Network Scanners)

Questions & Answers