The SSP/SCTM template identifies these controls that are applied to all.
What is a common control.
The final step of RMF
Continuous Monitoring
This is a single-PC system type.
MUSA
This online resource will be migrating to RTXConnections
rSpace
This is currently the RI&S President
Roy Azevedo
This document tracks "open" items and poses a timeline for correction.
Plan of Action and Milestones (POAM)
Approval granted by the AO for a system to process classified.
ATO
This must be verified by an ISO prior to a new user being accessed to a system.
Need-to-know (NTK)
Establishes, implements, monitors CIS program and ensures compliance.
ISSM
This is where the RIS Global Headquarters is located.
Arlington, VA
This monthly ConMon item will review the closed area for presence of prohibited mobile devices, during the monthly review process.
AC-19 Access Control for Mobile Devices
The likelihood of a threat taking advantage of a vulnerability and the corresponding business impact.
Risk
Assuming security requirements are met, this type of processing could take place in a closed office.
Restricted Area Processing
This document delineates roles and responsibilities with regards to a CIS.
RASCI
Global Spectrum Dominance (GSD) is made up from these two missions.
Secure Sensor Solutions (SSS) and Electronic Warfare Systems (EWS)
This quarterly ConMon will review the audit storage capacity is sufficient., during the quarterly review process.
AU-4 Audit Storage Capacity
All components of an information system to be authorized for operation by an authorizing official; excludes separately authorized systems, to which the information system is connected.
Information System Boundary
This is sometimes used to detect and deter access to CIS components
Security Seals
This document identifies the role of an ISSO.
ISSO Delegation Record
This is the Cybersecurity Director
Paul Garcia
This annual ConMon item verifies that usage restrictions and procedures for VOIP use inside closed areas are in place during the annual review process.
SC-19 Voice Over Internet Protocol (VoIP)
Secure conduit for protecting classified lines, transmitting data outside of a DCSA approved area (Closed Area).
Protected Distribution System (PDS).
This document outlines the steps required to render a device unclassified.
LOV/COV
This document identifies tasks undertaken when assuming a CIS.
ISSO Transition Checklist
This is the Western Regional cybersecurity manager
Ernie Grossman