Attachment J-12: Checklist and Certification for Minimum Level of Enhanced Safeguarding for Unclassified DoD Information

Similar documents
SEBUTHARGA NO. : SH/27/2017 SCOPE OF WORKS, TECHNICAL SPECIFICATIONS & REQUIREMENTS

Software Development Plan

EL RODEO SCHOOL VOLUNTEER HANDBOOK

Assessment Pack HABC Level 3 Award in Education and Training (QCF)

GUIDE TO EVALUATING DISTANCE EDUCATION AND CORRESPONDENCE EDUCATION

SYLLABUS- ACCOUNTING 5250: Advanced Auditing (SPRING 2017)

The University of British Columbia Board of Governors

PRINCE2 Practitioner Certification Exam Training - Brochure

Audit and Compliance Committee - Agenda

Guidance on the University Health and Safety Management System

Guidelines for Mobilitas Pluss top researcher grant applications

CAUL Principles and Guidelines for Library Services to Onshore Students at Remote Campuses to Support Teaching and Learning

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

Principles, theories and practices of learning and development

Application. All original documents must be received at UC San Diego by February 23, 2018.

Independent Assurance, Accreditation, & Proficiency Sample Programs Jason Davis, PE

Quality assurance of Authority-registered subjects and short courses

IDEA FEDERAL REGULATIONS PART B, Additional Requirements, 2008

11 CONTINUING EDUCATION

APPLICATION FORM STUDY TOUR MASTER PROGRAMMES

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

Nichole Davis Mentoring Program Administrator Risk Management Counsel South Carolina Bar

UNA PROFESSIONAL ACCOUNTING PREP PROGRAM

Measurement & Analysis in the Real World

ABI11111 ABIOSH Level 5 International Diploma in Environmental Sustainability Management

Contents I. General Section 1 Purpose of the examination and objective of the program Section 2 Academic degree Section 3

Appendix IX. Resume of Financial Aid Director. Professional Development Training

TITLE IX COMPLIANCE SAN DIEGO STATE UNIVERSITY. Audit Report June 14, Henry Mendoza, Chair Steven M. Glazer William Hauck Glen O.

FY16 UW-Parkside Institutional IT Plan Report

UTILITY POLE ATTACHMENTS Understanding New FCC Regulations and Industry Trends

Guidelines for Mobilitas Pluss postdoctoral grant applications

Glenn County Special Education Local Plan Area. SELPA Agreement

MADISON METROPOLITAN SCHOOL DISTRICT

English Language Arts Summative Assessment

STUDENT APPLICATION FORM 2016

North Carolina Community Colleges Golden LEAF Scholars Program Two-Year Colleges Student Application

GRADUATE ASSISTANTSHIP

Application for Admission

Duke University. Trinity College of Arts & Sciences/ Pratt School of Engineering Application for Readmission to Duke

IMPROVE THE QUALITY OF WELDING

FUNDING GUIDELINES APPLICATION FORM BANKSETA Doctoral & Post-Doctoral Research Funding

Smarter ELA/Literacy and Mathematics Interim Comprehensive Assessment (ICA) and Interim Assessment Blocks (IABs) Test Administration Manual (TAM)

Graduate Student Travel Award

Recognition of Prior Learning

Geo Risk Scan Getting grips on geotechnical risks

Secretariat 19 September 2000

Texas Board of Professional Engineers Professional Practice Update / Ethics

Lismore Comprehensive School

(2) "Half time basis" means teaching fifteen (15) hours per week in the intern s area of certification.

U N I V E R S I T E L I B R E D E B R U X E L L E S DEP AR TEM ENT ETUDES ET ET U IAN TS SER VICE D APPU I A LA G E STION DES ENSEIGNEMEN TS (SAGE)

Milton Public Schools Fiscal Year 2018 Budget Presentation

Dean s Performance and Quality Review Hertfordshire Partnership University NHS Foundation Trust June 2013

Spring North Carolina Community Colleges Golden LEAF Scholars Program Two-Year Colleges

Pharmaceutical Medicine

Northwest Georgia RESA

THE BROOKDALE HOSPITAL MEDICAL CENTER ONE BROOKDALE PLAZA BROOKLYN, NEW YORK 11212

Curricular Practical Training (CPT) is a type of employment authorization for students in F-1 status who Eligibility

HIGHLAND HIGH SCHOOL CREDIT FLEXIBILITY PLAN

Senior Stenographer / Senior Typist Series (including equivalent Secretary titles)

Qualification handbook

Developing, Supporting, and Sustaining Future Ready Learning

Casual and Temporary Teacher Programs

NOVIA UNIVERSITY OF APPLIED SCIENCES DEGREE REGULATIONS TRANSLATION

ITEM: 6. MEETING: Trust Board 20 February 2008

SANTIAGO CANYON COLLEGE STUDENT PLACEMENTOFFICE PROGRAM REVIEW SPRING SEMESTER, 2010

b) Allegation means information in any form forwarded to a Dean relating to possible Misconduct in Scholarly Activity.

Bilingual Staffing Guidelines

Introduction to Moodle

Records and Information Management Spring Semester 2016

November 17, 2017 ARIZONA STATE UNIVERSITY. ADDENDUM 3 RFP Digital Integrated Enrollment Support for Students

Certified Six Sigma Professionals International Certification Courses in Six Sigma Green Belt

Emergency Safety Intervention (ESI) Parent Information

HONORS OPTION GUIDELINES

School Experience Reflective Portfolio

Youth Sector 5-YEAR ACTION PLAN ᒫᒨ ᒣᔅᑲᓈᐦᒉᑖ ᐤ. Office of the Deputy Director General

HONG KONG INSTITUTE OF CERTIFIED PUBLIC ACCOUNTANTS

Banner Financial Aid Release Guide. Release and June 2017

Massachusetts Department of Elementary and Secondary Education. Title I Comparability

Thomas Jefferson University Hospital. Institutional Policies and Procedures For Graduate Medical Education Programs

Audit Documentation. This redrafted SSA 230 supersedes the SSA of the same title in April 2008.

IUPUI Office of Student Conduct Disciplinary Procedures for Alleged Violations of Personal Misconduct

Chapter 9 The Beginning Teacher Support Program

Background Checks and Pennsylvania Act 153 of 2014 Compliance. Frequently Asked Questions

Newcastle Safeguarding Children and Adults Training Evaluation Framework April 2016

Guidelines for the Master s Thesis Project in Biomedicine BIMM60 (30 hp): planning, writing and presentation.

CLINICAL TRAINING AGREEMENT

ARKANSAS TECH UNIVERSITY

General Information about NMLS and Requirements of the ROC

ADULT VOCATIONAL TRAINING PROGRAM APPLICATION

UVA Office of University Building Official. Annual Report

Rules of Procedure for Approval of Law Schools

Directorate Children & Young People Policy Directive Complaints Procedure for MOD Schools

Statewide Strategic Plan for e-learning in California s Child Welfare Training System

Community Unit # 2 School District Library Policy Manual

VIRGINIA INDEPENDENT SCHOOLS ASSOCIATION (VISA)

Reviewing the student course evaluation request

Field Experience Management 2011 Training Guides

TAP Responsibilities. Gordon Burke

Science Fair Project Handbook

Transcription:

Attachment J-12: Checklist and Certification for Minimum Level of Enhanced Safeguarding for Unclassified DoD Information Processed in accordance with provisions of Section C (MGT.16.1., MGT.16.2. and CP.3.) and CDRL A110 Checklist and Certification for Minimum Level of Enhanced Safeguarding for Unclassified DoD Information, of Contract HT9402-10-C-0002 Access Control AC-2 Account Management Select Answer Select AC-3 Access Enforcement Select Answer Select AC-3(4) Access Enforcement Select Answer Select AC-4 Information Flow Enforcement Select Answer Select AC-6 Least Privilege Select Answer Select AC-7 Unsuccessful Login Attempts Select Answer Select AC-11 Session Lock Select Answer Select AC-11(1) Session Lock Select Answer Select AC-17 Remote Access Select Answer Select AC-17(2) Remote Access Select Answer Select AC-18 Wireless Access Select Answer Select AC-18(1) Wireless Access Select Answer Select AC-19 Access Control for Mobile Devices Select Answer Select Awareness & Training AT-2 Security Awareness Select Answer Select HT9402-10-C-0002 TMA Form November 2011 Page 1 of 5

Audit & Accounting AU-2 Auditable Events Select Answer Select AU-3 Content of Audit Records Select Answer Select AU-6 Audit Review, Analysis & Reporting Select Answer Select AU-6(1) Audit Review, Analysis & Reporting Select Answer Select AU-7 Audit Reduction & Report Generation Select Answer Select AU-8 Time Stamps Select Answer Select AU-9 Protection of Audit Information Select Answer Select AU-10 Non-Repudiation Select Answer Select AU-10(5) Non-Repudiation Select Answer Configuration Management CM-2 Baseline Configuration Select Answer Select CM-6 Configuration Settings Select Answer Select CM-7 Least Functionality Select Answer Select CM-8 Information Sys Component Inventory Select Answer Select Contingency Planning CP-9 Information System Backup Select Answer Select Identification & Authentication IA-2 User Identification & Authentication Select Answer Select IA-4 Identifier Management Select Answer Select IA-5 Authenticator Management Select Answer Select IA-5(1) Authenticator Management Select Answer HT9402-10-C-0002 TMA Form November 2011 Page 2 of 5

Incident Response IR-2 Incident Response Training Select Answer Select IR-4 Incident Handling Select Answer Select IR-5 Incident Monitoring Select Answer Select IR-6 Incident Reporting Select Answer Select Maintenance MA-4 Remote Maintenance Select Answer Select MA-4(6) Remote Maintenance Select Answer MA-5 Maintenance Personnel Select Answer Select MA-6 Timely Maintenance Select Answer Select Media Protection MP-4 Media Storage Select Answer Select MP-6 Media Sanitization & Disposal Select Answer Select Physical & Environmental Protection PE-5 Access Control for Display Medium Select Answer Select PE-7 Visitor Control Select Answer Select Program Management PM-10 Security Authorization Process Select Answer HT9402-10-C-0002 TMA Form November 2011 Page 3 of 5

System & Comm Protection SC-2 Application Partitioning Select Answer Select SC-4 Information Remnance Select Answer Select SC-7 Boundary Protection Select Answer Select SC-7(2) Boundary Protection Select Answer Select SC-9 Transmission Confidentiality Select Answer Select SC-9(1) Transmission Confidentiality Select Answer Select SC-13 Use of Cryptography Select Answer Select SC-13(1) Use of Cryptography Select Answer SC-13(4) Use of Cryptography Select Answer SC-15 Collaborative Computing Select Answer Select SC-28 Protection of Information at Rest Select Answer System & Information Integrity SI-2 Flaw Remediation Select Answer Select SI-3 Malicious Code Protection Select Answer Select SI-4 Information System Monitoring Select Answer Select CERTIFICATION OF COMPLIANCE: I certify that I am an official representative for [insert name of contractor], that I have authority to sign this document and obligate [insert name of contractor] to the statements made in this document, and that I have personal knowledge of the matters to which this certification applies. I also certify that [insert name of contractor] is in compliance with the enhanced safeguarding requirements identified within the contract clause stated above, this document and any applicable written determinations. [Insert name of contractor] acknowledges that certification and submission of this document does not constitute approval or acceptance by the Government of the processes or procedures of [insert name of contractor] in meeting the expressed, enhanced safeguarding requirements required by contract, and that the Government may effect any or all rights and remedies allowed by law, regulation and/or contract requirements, clauses or special provisions in ensuring [insert name of contractor] meets the identified enhanced safeguarding requirements. HT9402-10-C-0002 TMA Form November 2011 Page 4 of 5

Signature: : Name: Title: Company: HT9402-10-C-0002 TMA Form November 2011 Page 5 of 5

Attachment J-12 Sample Written Determination Format Written Determination <Insert Reference #> in Support of TMA s DTM 08-027 Checklist <Insert > Contract Reference # Contactor Name Street Address City, ST ZIP Information Assurance (IA) Control #: IA Control Nomenclature: : <Enter the specific IA Control # from the Checklist > <Enter the specific IA Control s Nomenclature> <Restate the Contractor s compliance with the IA Control.> Issue: <Provide basic business description for why the contractor cannot / will not meet the requirements of the NIST 800-53/A IA control as listed on TMA s DTM 08-027 Checklist.> Contractor-identified Solution: <Provide a business-level description of the contractor s alternative plan to satisfy the security requirements associated with the Checklist s specific IA control.> Mitigation / Remediation Plan: <As appropriate, provide a business-level description of the contractor s plan of action and milestone for implementing the solution listed above.> Risk Acceptance <Provide a statement the contractor accepts the risk of either implementing a technical solution different from the NIST guidance or contract operations until the NIST control can be implemented.>