This document outlines what your responsibilities are as users of this customers information systems.
What are the Rules of Behavior?
These documents are required to move equipment into and out of a classified area.
What are IT Media Equipment Entry/Exit Form and Form 560-3?
This online system manages all of your DHS training records.
What is PALMS?
This person is responsible for the overall procurement, development, integration, modification, or operation and maintenance of an information system?
Who is the Information System Owner?
The process used to identify software programs that are not authorized to execute on an information system.
What is Blacklisting?
This document provides the complete list of approved hardware and software products in use on your enterprise network.
What is the Core System Security Plan (SSP)?
The Vulnerability Assessment Management team provides SCAP scans, clean STIG checklist and clean vulnerability scans to facilitate this process.
What is assessment and authorization (A&A)?
This is defined as a weakness or a gap in a security system.
What is a vulnerability?
This is what you provide to the VAM team to initiate a vulnerability or SCAP scan.
What are IPs/Hostnames?
This second special account type is use to administer the DHS enterprise devices (3 letter acronym).
What is a PAR account?
Operating System, Enterprise Application, Router, Switch, SAN, Network Device, Desktop PCs, Travel Kit, Tablet, SVTC, VoSIP phones all require this prior to network connectivity.
What is an authorization to connect (ATC)?
This efficient method is available to assist you with contacting your SENS3 IA point of contact.
What is the Security Services Support Matrix?
This DHS system allows users to upload and transfer files from one network to another network.
What is SWIFT?
The Program Manager assumes this role as part of the assessment and authorization process.
What is Information Systems Owner?
Missing Clearance info and fineAccessControl is a common issue when accessing this system.
What is Helix?
The approved configuration ensuring all open DISA STIG settings, critical, high and moderate findings are mitigated on a new operating system prior to network connection.
What is a certified image?
The process of verifying a person is actually the person they say they are before allowing them access to the network.
What is authentication?
This 256-bit length hashing algorithm is replacing the older less secure 160-bit hashing algorithm lengths.
What is SHA2?
This team provides all local Lorton facility security support and is augmented by the alternate information system security officers for physical security checks and support.
Who are the Special Security Representatives?
This agency publishes the STIGs that are the starting point for hardening most applications, operating systems and network devices.
Who is DISA?
This representative that supports the SSRs and scans disc for approval into SCIFs and controlled classified areas.
What are Alternate Information System Security Officers (AISSOs)?
The request that needs to be completed for a new small non-enterprise application approval.
What is a Software Assurance Request Form?
This credential is used to digitally identify an organization, hardware device, application, and information artifacts - but not a human actor.
What is a Non-Person Entity (NPE)?
These three key documentations are needed to provide a draft SSP and obtain an IATT/ATP from the ISSM.
What is the SIP, Physical Accreditation Letter and Hardware Inventory?
This group is responsible for conducting initial and validation compliance scans for system approval on HSDN.
What is the SENS3 Vulnerability Assessment Management (VAM) team?