CyberSecurity DoD
CyberSecurity DoD
INSTRUCTION
NUMBER 8500.01
March 14, 2014
Incorporating Change 1, Effective October 7, 2019
DoD CIO
SUBJECT: Cybersecurity
a. Reissues and renames DoD Directive (DoDD) 8500.01E (Reference (a)) as a DoD
Instruction (DoDI) pursuant to the authority in DoDD 5144.02 (Reference (b)) to establish a
DoD cybersecurity program to protect and defend DoD information and information technology
(IT).
b. Incorporates and cancels DoDI 8500.02 (Reference (c)), DoDD C-5200.19 (Reference
(d)), DoDI 8552.01 (Reference (e)), Assistant Secretary of Defense for Networks and
Information Integration (ASD(NII))/DoD Chief Information Officer (DoD CIO) Memorandums
(References (f) through (k)), and Directive-type Memorandum 08-060 (Reference (l)).
c. Establishes the positions of DoD principal authorizing official (PAO) and the DoD Senior
Information Security Officer (SISO) and continues the DoD Information Security Risk
Management Committee (DoD ISRMC).
2. APPLICABILITY
(1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of
Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General
of the DoD, the Defense Agencies, the DoD Field Activities, and all other organizational entities
within the DoD (referred to collectively in this instruction as the “DoD Components”).
DoDI 8500.01, March 14, 2014
(4) Special access program (SAP) information technology, other than SAP ISs handling
sensitive compartmented information (SCI) material.
b. Nothing in this instruction alters or supersedes the existing authorities and policies of the
Director of National Intelligence (DNI) regarding the protection of SCI as directed by Executive
Order 12333 (Reference (n)) and other laws and regulations.
a. Risk Management
(1) DoD will implement a multi-tiered cybersecurity risk management process to protect
U.S. interests, DoD operational capabilities, and DoD individuals, organizations, and assets from
the DoD Information Enterprise level, through the DoD Component level, down to the IS level
as described in National Institute of Standards and Technology (NIST) Special Publication (SP)
800-39 (Reference (o)) and Committee on National Security Systems (CNSS) Policy (CNSSP)
22 (Reference (p)).
(2) Risks associated with vulnerabilities inherent in IT, global sourcing and distribution,
and adversary threats to DoD use of cyberspace must be considered in DoD employment of
capabilities to achieve objectives in military, intelligence, and business operations.
(3) All DoD IT will be assigned to, and governed by, a DoD Component cybersecurity
program that manages risk commensurate with the importance of supported missions and the
value of potentially affected information or assets.
(4) Risk management will be addressed as early as possible in the acquisition of IT and
in an integrated manner across the IT life cycle.
(5) Documentation regarding the security posture of DoD IS and PIT systems will be
made available to promote reciprocity as described in DoDI 8510.01 (Reference (q)) and to assist
authorizing officials (AOs) from other organizations in making credible, risk-based decisions
regarding the acceptance and use of systems and the information that they process, store, or
transmit.
(1) Information and services are available to authorized users whenever and wherever
required according to mission needs, priorities, and changing roles and responsibilities.
Change 1, 10/07/2019 2
DoDI 8500.01, March 14, 2014
(2) Security posture, from individual device or software object to aggregated systems of
systems, is sensed, correlated, and made visible to mission owners, network operators, and to the
DoD Information Enterprise consistent with DoDD 8000.01 (Reference (r)).
(3) Whenever possible, technology components (e.g., hardware and software) have the
ability to reconfigure, optimize, self-defend, and recover with little or no human intervention.
Attempts made to reconfigure, self-defend, and recover should produce an incident audit trail.
(1) Cybersecurity must be fully integrated into system life cycles and will be a visible
element of organizational, joint, and DoD Component IT portfolios.
(3) All interconnections of DoD IT will be managed to minimize shared risk by ensuring
that the security posture of one system is not undermined by vulnerabilities of interconnected
systems.
d. Cyberspace Defense. Cyberspace defense actions are taken within cyberspace to defeat
specific threats that have breached or are threatening to beach system cybersecurity measures.
Actions include detecting, characterizing, countering, mitigating threats, (e.g., malware,
unauthorized activity, and vulnerabilities) and restoring systems to a secure configuration as
described in Joint Publication 3-12 (Reference (s)).
e. Performance
(2) Performance will be measured, assessed for effectiveness, and managed relative to
contributions to mission outcomes and strategic goals and objectives, in accordance with
Sections 11103 and 11313 of Title 40, United States Code (U.S.C.) (Reference (t)).
(3) Data will be collected to support reporting and cybersecurity management activities
across the system life cycle.
(4) Standardized IT tools, methods, and processes will be used to the greatest extent
possible to eliminate duplicate costs and to focus resources on creating technologically mature
and verified solutions.
f. DoD Information. All DoD information in electronic format will be given an appropriate
level of confidentiality, integrity, and availability that reflects the importance of both information
sharing and protection.
Change 1, 10/07/2019 3
DoDI 8500.01, March 14, 2014
g. Identity Assurance
(1) Identity assurance must be used to ensure strong identification, authentication, and
eliminate anonymity in DoD IS and PIT systems.
(2) DoD will public key-enable DoD ISs and implement a DoD-wide Public Key
Infrastructure (PKI) solution that will be managed by the DoD PKI Program Management Office
in accordance with DoDI 8520.02 (Reference (u)).
(3) Biometrics used in support of identity assurance will be managed in accordance with
DoDD 8521.01 (Reference (v)).
h. Information Technology
(1) All IT that receives, processes, stores, displays, or transmits DoD information will be
acquired, configured, operated, maintained, and disposed of consistent with applicable DoD
cybersecurity policies, standards, and architectures.
(2) Risks associated with global sourcing and distribution, weaknesses or flaws inherent
in the IT, and vulnerabilities introduced through faulty design, configuration, or use will be
managed, mitigated, and monitored as appropriate.
(3) Cybersecurity requirements must be identified and included throughout the lifecycle
of systems including acquisition, design, development, developmental testing, operational
testing, integration, implementation, operation, upgrade, or replacement of all DoD IT supporting
DoD tasks and missions.
i. Cybersecurity Workforce
(1) Cybersecurity workforce functions must be identified and managed, and personnel
performing cybersecurity functions will be appropriately screened in accordance with this
instruction and DoD Manual (DoDM) 5200.2 (Reference (w)), and qualified in accordance with
DoDD 8140.01 (Reference (x)) and supporting issuances.
(2) Qualified cybersecurity personnel must be identified and integrated into all phases of
the system development life cycle.
j. Mission Partners
(1) Capabilities built to support cybersecurity objectives that are shared with mission
partners will be consistent with guidance contained in Reference (r) and governed through
integrated decision structures and processes described in this instruction.
(2) DoD-originated and DoD-provided information residing on mission partner ISs must
be properly and adequately safeguarded, with documented agreements indicating required levels
of protection.
Change 1, 10/07/2019 4
DoDI 8500.01, March 14, 2014
e. Change the Defense Security Service to the Defense Counterintelligence and Security
Agency (DCSA) and the United States Strategic Command (USSTRATCOM) to the United
States Cyber Command (USCYBERCOM) in accordance with the August 15, 2017 Presidential
Memorandum.
Teresa M. Takai
DoD Chief Information Officer
Enclosures
1. References
2. Responsibilities
3. Procedures
Glossary
Change 1, 10/07/2019 5
DoDI 8500.02, March 14, 2014
TABLE OF CONTENTS
INTRODUCTION ...................................................................................................................26
RISK MANAGEMENT...........................................................................................................26
OPERATIONAL RESILIENCE..............................................................................................30
INTEGRATION AND INTEROPERABILITY ......................................................................31
CYBERSPACE DEFENSE .....................................................................................................32
PERFORMANCE ....................................................................................................................33
DoD INFORMATION .............................................................................................................34
IDENTITY ASSURANCE ......................................................................................................35
INFORMATION TECHNOLOGY .........................................................................................36
CYBERSECURITY WORKFORCE.......................................................................................43
MISSION PARTNERS ............................................................................................................43
DoD SISO ................................................................................................................................45
DoD COMPONENT CIOs ......................................................................................................46
DoD RISK EXECUTIVE FUNCTION ...................................................................................47
PAO..........................................................................................................................................47
AO ............................................................................................................................................47
ISOs OF DoD IT ......................................................................................................................48
ISSM ........................................................................................................................................48
ISSO .........................................................................................................................................49
PRIVILEGED USERS (E.G. SYSTEM ADMINISTRATOR)...............................................50
AUTHORIZED USERS ..........................................................................................................50
Change 1, 10/07/2019 6 CONTENTS
DoDI 8500.01, March 14, 2014
GLOSSARY ..................................................................................................................................52
FIGURE
ENCLOSURE 1
REFERENCES
(a) DoD Directive 8500.01, “Information Assurance (IA),” October 4, 2002 (hereby cancelled)
(b) DoD Directive 5144.02, “DoD Chief Information Officer (DoD CIO),” November 21,
2014, as amended
(c) DoD Instruction 8500.2, “Information Assurance (IA) Implementation,” February 6, 2003
(hereby cancelled)
(d) DoD Directive C-5200.19, “Control of Compromising Emanations (U),” May 16, 1995
(hereby cancelled)
(e) DoD Instruction 8552.01, “Use of Mobile Code Technologies in DoD Information
Systems,” October 23, 2006 (hereby cancelled)
(f) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, “Disposition of Unclassified DoD Computer Hard
Drives,” June 4, 2001 (hereby cancelled)
(g) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, “Certification and Accreditation Requirements for
DoD-wide Managed Enterprise Services Procurements,” June 22, 2006 (hereby cancelled)
(h) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, “Use of Peer-to-Peer (P2P) File-Sharing Applications
Across DoD,” November 23, 2004 (hereby cancelled)
(i) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, “Department of Defense (DoD) Guidance on Protecting
Personally Identifiable Information (PII),” August 18, 2006 (hereby cancelled)
(j) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, “Encryption of Sensitive Unclassified Data At Rest on
Mobile Computing Devices and Removable Storage Media,” July 3, 2007 (hereby
cancelled)
(k) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, “Protection of Sensitive Department of Defense (DoD)
Data at Rest On Portable Computing Devices,” April 18, 2006 (hereby cancelled)
(l) Directive-type Memorandum 08-060, “Policy on Use of Department of Defense (DoD)
Information Systems — Standard Consent Banner and User Agreement,” May 9, 2008, as
amended (hereby cancelled)
(m) National Security Presidential Directive-54/Homeland Security Presidential Directive-23,
“Cybersecurity Policy,” January 8, 2008 1
(n) Executive Order 12333, “United States Intelligence Activities,” as amended
(o) National Institute of Standards and Technology Special Publication 800-39, “Managing
Information Security Risk: Organization, Mission, and Information System View,” current
edition
1
Document is classified TOP SECRET. To obtain a copy, fax a request to the Homeland Security Council
Executive Secretary at 202-456-5158 and the National Security Council’s Senior Director for Records and Access
Management at 202-456-9200.
(p) Committee on National Security Systems Policy 22, “Cybersecurity Risk Management
Policy,” August, 2016
(q) DoD Instruction 8510.01, “Risk Management Framework (RMF) for DoD Information
Technology (IT),” March 12, 2014, as amended
(r) DoD Directive 8000.01, “Management of the Department of Defense Information
Enterprise,” March 17, 2016, as amended
(s) Joint Publication 3-12, “Cyberspace Operations,” June 8, 2018
(t) Title 40, United States Code
(u) DoD Instruction 8520.02, “Public Key Infrastructure (PKI) and Public Key (PK)
Enabling,” May 24, 2011
(v) DoD Directive 8521.01E, “DoD Biometrics,” January 13, 2016, as amended
(w) DoD Manual 5200.02, “Procedures for the Personnel Security Program (PSP),” April 3,
2017
(x) DoD Directive 8140.01, “Cyberspace Workforce Management,” August 11,2015, as
ammended
(y) DoD Chief Information Officer Memorandum, “DoD Cyber Hygiene Scorecard –
Supplemental Guidance,” March 22, 2019 2
(z) Title 32, Part 2002, Code of Federal Regulations
(aa) Title 44, United States Code
(ab) DoD Directive 5230.11, “Disclosure of Classified Military Information to Foreign
Governments and International Organizations,” June 16, 1992
(ac) DoD Directive 8115.01, “Information Technology Portfolio Management,” October 10,
2005
(ad) DoD Instruction 5205.13, “Defense Industrial Base (DIB) Cybersecurity (CS) Activities,”
January 29, 2010, as amended
(ae) DoD Directive 3020.40, “Mission Assurance (MA),” November 29, 2016, as amended
(af) Deputy Secretary of Defense Memorandum, “Delegation of Authority to Negotiate and
Conclude International Agreements on Cooperation in Information Assurance and
Computer Network Defense,” March 5, 2002 3
(ag) DoD Directive 5530.3, “International Agreements,” June 11, 1987, as amended
(ah) DoD Instruction 8540.01, “Cross Domain (CS) Policy), May 8, 2015, as amended
(ai) National Security Directive 42, “National Policy for the Security of National Security
Telecommunications and Information Systems,” July 5, 1990
(aj) Office of Management and Budget Circular A-130, “Management of Federal Information
Resources,” as amended
(ak) DoD Instruction 8010.01, “Department of Defense Information Network (DODIN)
Transport,” September 10, 2018
(al) DoD Instruction 8551.01, “Ports, Protocols, and Services Management (PPSM),” May 28,
2014, as amended
(am) DoD Instruction 8100.04, “DoD Unified Capabilities (UC),” December 9, 2010
(an) Defense Security/Cybersecurity Authorization Working Group (DSAWG) Charter, April 8,
2016 4
2
https://dodcio.defense.gov/Library/
3
Requests for copies can be forwarded to the DoD CIO.
4
https://dodcio.defense.gov/Library/
(ao) Department of Defense Information Security Risk Management Charter, May, 2016, as
amended 5
(ap) DoD Directive 5134.01, “Under Secretary of Defense for Acquisition, Technology, and
Logistics (USD(AT&L)),” December 9, 2005, as amended
(aq) DoD Instruction 3200.12, “DoD Scientific and Technical Information Program (STIP),”
August 22, 2013, as amended
(ar) DoD Instruction 8580.1, “Information Assurance (IA) in the Defense Acquisition System,”
July 9, 2004
(as) DoD Directive 5000.01, “The Defense Acquisition System,” May 12, 2003, as amended
(at) DoD Instruction 5000.02, “Operation of the Defense Acquisition System,” January 7, 2015,
as amended
(au) DoD Instruction 8330.01, “Interoperability of Information Technology (IT), Including
National Security Systems (NSS),” May 21, 2014, as amended
(av) Section 1043 of Public Law 106-65, “Information Assurance Initiative,” October 5, 1999
(aw) DoD Instruction 5200.39, “Critical Program Information (CPI) Identification and Protection
within Research, Development, Test, and Evaluation (RDT&E),” May 28, 2015, as
amended
(ax) DoD Instruction 5134.16, “Deputy Assistant Secretary of Defense for Systems Engineering
(DASD(SE)),” August 19, 2011, as amended
(ay) DoD Manual 8570.01, “Information Assurance Workforce Improvement Program,”
December 19, 2005, as amended
(az) DoD Instruction 5134.17, “Deputy Assistant Secretary of Defense for Developmental Test
and Evaluation (DASD(DT&E)),” October 25, 2011, as amended
(ba) Director, Operational Test and Evaluation Memorandum, “Procedures for Operational Test
and Evaluation of Cybersecurity in Acquisition Programs,” April 3, 2018 6
(bb) DoD Directive 5100.20, “National Security Agency/Central Security Service (NSA/CSS),”
January 26, 2010
(bc) Committee on National Security Systems Policy 11, “National Policy Governing the
Acquisition of Information Assurance (IA) and IA-Enabled Information Technology
Products,” June 10, 2013, as amended
(bd) Title 10, United States Code
(be) Committee on National Security Systems Policy 15, “Use of Public Standards for
Information Sharing,” October 20, 2016
(bf) DoD 5220.22-M, “National Industrial Security Program Operating Manual,” February 28,
2006, as amended
(bg) DoD Instruction 8530.01, “Cybersecurity Activities Support to DoD Information Network
Operations,” March 7, 2016
(bh) DoD Instruction 5200.44, “Protection of Mission Critical Functions to Achieve Trusted
Systems and Networks (TSN),” November 5, 2012, as amended
(bi) DoD Instruction 8560.01, “Communications Security (COMSEC) Monitoring,” August 22,
2018
5
Requests for copies can be forwarded to the DoD CIO.
6
Available at
https://www.dote.osd.mil/pub/policies/2018/20180403ProcsForOTEofCybersecurityInAcqProgs(17092).pdf.
(bj) DoD Manual 5200.01, Volume 3, “DoD Information Security Program: Protection of
Classified Information,” February 24, 2012, as amended
(bk) DoD Manual 5200.01, Volume 4, “DoD Information Security Program: Controlled
Unclassified Information (CUI),” February 24, 2012, as amended
(bl) DoD 5400.11-R, “Department of Defense Privacy Program,” May 14, 2007
(bm) Committee on National Security Systems Instruction 1010, “Cyber Incident Response,”
December 16, 2016
(bn) DoD Manual 5200.01, Volume 1, “DoD Information Security Program: Overview,
Classification, and Declassification,” February 24, 2012, as amended
(bo) DoD Instruction 1400.25, Volume 731, “DoD Civilian Personnel Management System:
Suitability and Fitness Adjudication For Civilian Employees,” August 24, 2012
(bp) Title 29, United States Code
(bq) National Institute of Standards and Technology Special Publication 800-34, Revision 1,
“Contingency Planning Guide for Federal Information Systems,” current edition
(br) DoD 5200.08-R, “Physical Security Program,” April 9, 2007, as amended
(bs) DoD Manual 5200.01, Volume 2, “DoD Information Security Program: Marking of
Classified Information,” February 24, 2012, as amended
(bt) DoD 5220.22-R, “Industrial Security Regulation,” April 12, 1985
(bu) Committee on National Security Systems Policy 300, “National Policy on Control of
Compromising Emanations,” January 11, 2006, as amended
(bv) Committee on National Security Systems Instruction 7000, “TEMPEST Countermeasures
for Facilities,” May 2004, as amended
(bw) DoD Instruction 5015.02, “DoD Records Management Program,” August 17, 2017
(bx) Unified Command Plan, current edition
(by) National Institute of Standards and Technology Special Publication 800-30, “Guide for
Conducting Risk Assessments,” current edition
(bz) DoD Directive 5105.53, “Director of Administration and Management (DA&M),”
February 26, 2008
(ca) National Institute of Standards and Technology Special Publication 800-37, “Guide for
Applying the Risk Management Framework to Federal Information Systems: A Security
Life Cycle Approach,” current edition
(cb) Committee on National Security Systems Instruction 1253, “Security Categorization and
Control Selection for National Security Systems,” March 27, 2014
(cc) National Institute of Standards and Technology Special Publication 800-53, “Security and
Privacy Controls for Federal Information Systems and Organizations,” current edition
(cd) National Institute of Standards and Technology Special Publication 800-53A, “Guide for
Assessing the Security and Privacy Controls in Federal Information Systems and
Organizations,” current edition
(ce) Section 806 of the Ike Skelton National Defense Authorization Act for Fiscal Year 2011,
January 7, 2011
(cf) DoD Directive 3020.26, “DoD Continuity Programs,” February 14, 2018
(cg) Secretary of Defense Memorandum, “Maintaining Readiness to Operate in Cyberspace
Domain,” December 7, 2012
(ch) DoD Instruction 8523.01, “Communications Security (COMSEC),” April 22, 2008
(ci) National Institute of Standards and Technology Special Publication 800-126, “The
Technical Specification for Security Content Automation Protocol (SCAP): SCAP Version
1.1,” current edition
(cj) National Institute of Standards and Technology Special Publication 800-137, “Information
Security Continuous Monitoring (ISCM) for Federal Information Systems and
Organizations,” current edition
(ck) DoD Instruction 8520.03, “Identity Authentication for Information Systems,” May 13,
2011, as amended
(cl) DoD Directive 5505.13E, “DoD Executive Agent (EA) for the DoD Cyber Crime Center
(DC3),” March 1, 2010, as amended
(cm) DoD Instruction 5240.26, “Countering Espionage, International Terrorism, and the
Counterintelligence (CI) Insider Threat,” May 4, 2012, as amended
(cn) Chairman of the Joint Chiefs of Staff Instruction 5123.01H, “Charter of the Joint
Requirements Oversight Council (JROC) and Implementation of the Joint Capabilities
Integration and Development System (JCIDS),” August 31, 2018
(co) DoD Directive 7045.14, “The Planning, Programming, Budgeting, and Execution (PPBE)
Process,” January 25, 2013, as amended
(cp) DoD Chief Information Officer Memorandum, “Department of Defense Chief Information
Officer Executive Board Charter,” February, 12, 2012
(cq) DoD Instruction 5200.01, “DoD Information Security Program and Protection of Sensitive
Compartmented Information,” April 21, 2016, as amended
(cr) DoD Instruction 8320.02, “Sharing Data Information, and Technology (IT) Services in the
Department of Defense,” August 5, 2013
(cs) DoD Instruction 8320.07, “Implementing Sharing of Data, Information, and Information
Technology (IT) Services in the Department of Defense,” August 3, 2015, as amended
(ct) DoD Instruction 5230.09, “Clearance of DoD Information for Public Release,” January 25,
2019
(cu) DoD Instruction 8582.01, “Security of Unclassified DoD Information on Non-DoD
Information Systems,” June 6, 2012, as amended
(cv) DoD Instruction 5400.16, “DoD Privacy Impact Assessment (PIA) Guidance,”
July 14, 2015, as amended
(cw) DoD 8580.02 Instruction, “Security of Individually Identifiable Health Information in DoD
Health Care Programs,” August 12, 2015
(cx) DoD Manual 5205.02, “DoD Operations Security (OPSEC) Program Manual,”
November 3, 2008, as amended
(cy) DoD Instruction 8170.01, “Online Information Management and Electronic Messaging,”
January 2, 2019
(cz) Under Secretary of Defense for Acquisition, Technology, and Logistics Memorandum,
“Document Streamlining Program Protection Plan,” July 18, 2011
(da) Section 811 of Public Law 106-398, “National Defense Authorization Fiscal Year 2001,”
October 30, 2000
(db) Committee on National Security Systems Policy No. 12, “Cybersecurity Policy for Space
Systems Used to Support National Security Missions,” February 6, 2018
(dc) Committee on National Security Systems Instruction 4004.1, “Destruction and Emergency
Protection Procedures for COMSEC and Classified Material,” January 10, 2008
(dd) National Institute of Standards and Technology Special Publication 800-88, “Guidelines for
Media Sanitization,” current edition
(de) DoD Architecture Framework Version 2.02, August 2010 7
(df) DoD Instruction 5000.64, “Accountability and Management of DoD Equipment and Other
Accountable Property,” April 27, 2017, as ammended
(dg) DoD Instruction 2030.08, “Implementation of Trade Security Controls (TSC) for Transfers
of DoD U.S. Munitions List (USML) and Commerce Control List (CCL) Personal Property
to Parties Outside DoD Control,” February 19, 2015, as ammended
(dh) DoD Instruction 1035.01, “Telework Policy,” April 4, 2012
(di) National Institute of Standards and Technology Special Publication 800-114, “Users Guide
to Telework and Bring Your Own Device (BYOD) Security,” current edition
(dj) National Institute of Standards and Technology Special Publication 800-147, “BIOS
Protection Guidelines for Servers,” current edition
(dk) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer, “Coalition Public Key Infrastructure, X.509 Certificate Policy,”
current edition
(dl) DoD Directive 5230.20, “Visits and Assignments of Foreign Nationals,” June 22, 2005
(dm) DoD Instruction 5230.27, “Presentation of DoD-Related Scientific and Technical Papers at
Meetings,” November 18, 2016, as amended
(dn) DoD Instruction 2040.02, “International Transfers of Technology, Articles, and Services,”
March 27, 2014, as amended
(do) DoD Instruction 1100.22, “Policy and Procedures for Determining Workforce Mix,”
April 12, 2010, as amended
(dp) DoD Directive 5205.02E, “DoD Operations Security (OPSEC) Program,” June 20, 2012, as
amended
(dq) Committee on National Security Systems Instruction Number 4009, “Committee on
National Security Systems (CNSS) Glossary,” April 6, 2015
(dr) Office of the Chairman of the Joint Chiefs of Staff, “DoD Dictionary of Military and
Associated Terms,” current edition
(ds) Presidential Memorandum, “Elevation of U.S. Cyber Command to a Unified Combatant
Command,” August 15, 2017
7
Available at https://dodcio.defense.gov/Library/DoD-Architecture-Framework/
ENCLOSURE 2
RESPONSIBILITIES
a. Monitors, evaluates, and provides advice to the Secretary of Defense regarding all DoD
cybersecurity activities and oversees implementation of this instruction.
b. Develops and establishes DoD cybersecurity policy and guidance consistent with this
instruction and in accordance with applicable federal law and regulations.
c. Appoints a DoD SISO in accordance with section 3554 of Title 44, U.S.C. (Reference
(aa)).
d. Coordinates with the Under Secretary of Defense for Policy (USD(P)) to ensure that
cybersecurity strategies and policies are aligned with overarching DoD cyberspace policy and, in
accordance with DoDD 5230.11 (Reference (ab)), support policies relating to the disclosure of
classified military information to foreign governments and international organizations.
e. Coordinates with the Under Secretary of Defense for Personnel and Readiness
(USD(P&R)) to:
(1) Ensure personnel identity policies and cybersecurity policies and capabilities are
aligned and mutually supportive.
f. Coordinates with the Under Secretary of Defense for Intelligence (USD(I)) to ensure that
cybersecurity policies and capabilities are aligned with and mutually supportive of personnel,
physical, industrial, information, and operations security policies and capabilities.
h. Maintains a formal coordination process with the Intelligence Community (IC) Chief
Information Officer (CIO) to ensure proper protection of IC information within DoD, reciprocity
of IS authorization and cybersecurity risk management processes, and alignment of
cybersecurity.
i. Coordinates with the Under Secretary of Defense for Acquisition, Technology, and
Logistics (USD(AT&L)) to ensure that cybersecurity responsibilities are integrated into
processes for DoD acquisition programs, including research and development.
j. Coordinates with the Director, Operational Test and Evaluation (DOT&E) to ensure that
cybersecurity responsibilities are integrated into the operational testing and evaluation for DoD
acquisition programs.
l. Appoints a PAO for DoD ISs and PIT systems governed by the Enterprise Information
Environment Mission Area (EIEMA) as described in DoDD 8115.01 (Reference (ac)).
m. Coordinates with the DoD mission area owners to ensure that cybersecurity
responsibilities are addressed for all DoD IT.
n. Coordinates with the USD(P) and USD(I) on integrating Defense Industrial Base (DIB)
cybersecurity threat information-sharing activities and enhancing DoD and DIB cyber situational
awareness in accordance with DoDI 5205.13 (Reference (ad)) and in support of DoDD 3020.40
(Reference (ae)).
(1) USD(P).
(5) CJCS.
q. Establishes policy for the life cycle management of cross-domain (CD) solutions (CDSs)
in accordance with DoDI 8540.01 (Reference (ah).
r. Develops and implements policy regarding continuous monitoring of DoD IT with direct
support from NSA/CSS and Defense Information Systems Agency (DISA), and input from the
other DoD Components.
s. Appoints a military officer in the grade of O-6 or an equivalent civilian employee as the
Defense Security/Cybersecurity Authorization Working Group (DSAWG) Chair.
2. DIRECTOR, DISA. Under the authority, direction, and control of the DoD CIO and in
addition to the responsibilities in section 13 of this enclosure, the Director, DISA:
c. Develops or acquires solutions that support cybersecurity objectives for use throughout
DoD via the ESSG.
d. Establishes and maintains the DoD Cyber Exchange in accordance with Office of
Management and Budget Circular A-130 (Reference (aj)) as the DoD knowledge repository
for cybersecurity related policy, guidance, and information.
e. Oversees and maintains the connection approval process in accordance with DoDI
8010.01 (Reference (ak)), CD connection policy in accordance with Reference (ah), DoDI
8551.01 (Reference (al)), and DoDI 8100.04 (Reference (am)) for the DISN (e.g., the Secret
Internet Protocol Router Network (SIPRNet) and the Non-Classified Internet Protocol Router
Network (NIPRNet)) in coordination with the DSAWG (Reference (an)) and DoD ISRMC
(Reference (ao)), when appropriate.
j. Develops and provides cybersecurity training and awareness products and a distributive
training capability to support the DoD Components in accordance with Reference (x) and post
the training materials on the DoD Cyber Exchange Website (https://public.cyber.mil/).
l. Coordinates with the USD(I) to ensure command cyber readiness inspection guidance and
metrics provide a unity of effort among the security disciplines (i.e., personnel, physical,
industrial, information, operations, and cybersecurity).
a. Integrates policies established in this instruction and its supporting guidance into
acquisition policy, regulations, and guidance consistent with DoDD 5134.01 (Reference (ap)).
b. Through the Assistant Secretary of Defense for Research and Engineering, monitors and
oversees all DoD cybersecurity research and engineering investments, including research at the
NSA.
(au)), section 1043 of Public Law 106-65 (Reference (av)), and this instruction, in coordination
with the DoD CIO.
f. Assists with acquisition-related (e.g., research, development, test and evaluation (T&E))
agreements, and international cybersecurity and cyberspace defense negotiations and
agreements, in accordance with Reference (ag), as needed.
g. Ensures that PIT systems included in acquisition programs are designated, categorized,
and have their authorization boundaries defined according to the guidelines provided in
Reference (q).
h. Ensures that policy and procedures for developing program protection plans (PPPs)
required by DoDI 5200.39 (Reference (aw)) address cybersecurity in accordance with this
instruction.
i. Defines, develops, and integrates systems security engineering (SSE) into the systems
engineering workforce and curriculum in accordance with DoDI 5134.16 (Reference (ax)).
k. Coordinates with the DoD Test Resource Management Center for establishment of
developmental T&E (DT&E) specific cybersecurity architectures and requirements.
a. Develops and provides policy for cybersecurity testing and evaluation during operational
evaluations within DoD, including, but not limited to the DOT&E Memorandum (Reference
(ba)) describing the cybersecurity testing process.
c. Oversees cybersecurity assessments by test agencies during both acquisition and exercise
events as mandated by relevant statutory requirements.
d. Reviews and approves cybersecurity OT&E documentation for all IT, IS, PIT, and special
interest programs as required.
a. Coordinates with the DoD CIO to ensure that cybersecurity strategies, policies, and
capabilities are aligned with overarching DoD cyberspace policy, and are supportive of policies
and capabilities relating to the disclosure of classified military information to foreign
governments and international organizations in accordance with Reference (ab).
b. Coordinates with the DoD CIO on international cybersecurity and cyberspace defense
strategies and policies, as well as the negotiating, performing, and concluding agreements with
international partners to engage in cooperative, international cybersecurity and cyberspace
defense activities in accordance with Reference (af).
c. Coordinates with the DoD CIO on enhancing DoD and DIB cyber situational awareness in
accordance with Reference (ad) and in support of Reference (ae).
b. Coordinates with the DoD CIO and the USD(P) on intelligence-related international
cybersecurity and cyberspace defense strategies, policies, and agreements with international
partners.
c. Appoints the PAO for DoD ISs and PIT systems governed by the DoD portion of the
Intelligence Mission Area (DIMA) as described in Reference (ac).
9. DIRNSA/CHCSS. Under the authority, direction, and control of the USD(I), and in addition
to the cybersecurity-related responsibilities in DoDD 5100.20 (Reference (bb)) and the
responsibilities in section 13 of this enclosure, the DIRNSA/CHCSS:
c. Provides cybersecurity support to the DoD Components in order to assess threats to, and
vulnerabilities of, information technologies.
d. Engages the cybersecurity industry and DoD user community to foster development,
evaluation, and deployment of cybersecurity solutions that satisfy the guidance in this
instruction.
f. Supports the development of NIST publications and provides engineering support and
other technical assistance for their implementation within DoD.
g. Develops SSE training and qualification programs and oversees continuing education
requirements for all trained IS security engineers and cybersecurity architects throughout DoD
in accordance with Reference (ax).
h. Serves as the DoD focal point for the National IA Partnership and establishes criteria and
processes for evaluating and validating all IA and IA-enabled products in accordance with
CNSSP 11 (Reference (bc)).
i. Develops and issues security implementation specifications for the configuration of IA-
and IA-enabled products (e.g., security configuration guides) and supports DISA in the
development of SRGs and STIGs.
j. Serves as the DoD focal point for cybersecurity cryptographic research and development
in accordance with Assistant Secretary of Defense for Research and Engineering direction and in
coordination with the Director, Defense Advanced Research Projects Agency.
k. Manages the DoD Cyber Scholarship Program in accordance with sections 2200-2200f of
Title 10, U.S.C. (Reference (bd)).
l. Plans, designs, manages, and executes the development and implementation of the key
management infrastructure within DoD in coordination with DoD CIO.
m. Plans, designs, and manages the development and implementation of PKI within DoD, in
coordination with DoD CIO and DISA.
10. DIRECTOR, DCSA. Under the authority, direction, and control of the USD(I) and in
addition to the responsibilities in section 13 of this enclosure, the Director, DCSA, monitors and
oversees IS security practices of DoD contractors and vendors processing classified DoD
information in accordance with DoD 5220.22M (Reference (bf)) and DoDI 8530.01 (Reference
(bg)).
b. Ensure that cybersecurity requirements are addressed and visible in all capability
portfolios, IT life-cycle management processes, and investment programs incorporating IT.
c. Appoint an AO for all DoD IS and PIT systems under their purview and ensure
all DoD ISs and PIT systems are authorized in accordance with Reference (q).
d. Ensure that PIT systems are identified, designated as such, and centrally registered at the
DoD Component level.
e. Ensure that SSE and trusted systems and networks (TSN) processes, tools, and
techniques described in DoDI 5200.44 (Reference (bh)) are used in the acquisition of all
applicable IT under their purview.
f. Ensure that organizational solutions that support cybersecurity objectives acquired and
developed via the ESSG process are implemented when possible, and participate in the ESSG
process to ensure capabilities acquired or developed meet organizational requirements.
g. Provide for a cybersecurity monitoring and testing capability in accordance with DoDI
8560.01 (Reference (bi)) and other applicable laws and regulations.
(3) Collect and keep audit data to support technical analysis relating to misuse,
penetration, or other incidents involving IT under their purview, and provide this data to
appropriate law enforcement (LE) or other investigating agencies.
(a) DoDM 5200.01, Volume 3 (Reference (bj)) for an actual or potential compromise
of classified information.
(c) Reference (bf) when such losses occur on cleared contractor systems.
i. Ensure that contracts and other agreements include specific requirements to provide
cybersecurity for DoD information and the IT used to process that information in accordance
with this instruction.
j. Ensure that all personnel with access to DoD IT are appropriately cleared and qualified
under the provisions of Reference (w) and that access to all DoD IT processing specified types of
information (e.g., collateral, SCI, CUI) under their purview is authorized in accordance with the
provisions of Reference (bj) and DoDM 5200.01, Volume 1 (Reference (bn)) or Reference (bk).
(2) Trained and qualified in accordance with References (x) and (ay).
(3) Assigned a position designation using the criteria found in Reference (w) and DoDI
1400.25 Vol. 731 (Reference (bo)). The position designation will be documented in the Defense
Civilian Personnel Data System.
l. Cybersecurity training and awareness products developed by DISA will be used to meet
the baseline user awareness training required by Reference (x). DoD Components will provide
additional cybersecurity orientation, training, and awareness programs to reinforce the objectives
of the DoD Enterprise cybersecurity awareness programs to authorized users of ISs. This
includes conducting additional in-depth training on DoD Component-specific topics.
m. Ensure that appropriate notice of privacy rights and monitoring policies are
provided to all individuals accessing DoD Component-owned or controlled DoD ISs.
n. Ensure that cybersecurity solutions do not unnecessarily restrict the use of assistive
technology by individuals with disabilities or access to or use of information and data by
individuals with disabilities in accordance with sections 791, 794, and 794d of Title 29, U.S.C.
(Reference (bp)).
p. Ensure that the cybersecurity testing and evaluation is conducted throughout the
acquisition life cycle and integrated with interoperability and other functional testing, and that
a cybersecurity representative participates in planning, execution, and reporting of integrated
T&E activities as discussed in Enclosure 6 of Reference (at).
q. Collect and report cybersecurity metrics, and ensure that an annual assessment of theDoD
Component cybersecurity program is conducted as required by section 3555 of Reference (aa).
r. Develop DoD IS contingency plans and conduct exercises to recover IS services following
an emergency or IS disruption using guidance found in NIST SP 800-34 (Reference (bq)).
s. Establish a physical security program to protect DoD IT from damage, loss, theft, or
unauthorized physical access in accordance with DoD 5200.08-R (Reference (br)).
t. Ensure all systems are reported in either the Enterprise Mission Assurance Support
Service (eMASS) or Enterprise Reporting System (ERS). Components using alternate tools
for system data are required to work with the DoD CIO to ensure required system data can be
regularly imported to ERS via an application programming interface or other method in
accordance with Reference (y).
u. Ensure that all DoD IT under their purview complies with applicable STIGs, security
configuration guides, and SRGs with any exceptions documented and approved by the
responsible AO.
x. Implement procedures issued by the DASD(DT&E) and DOT&E to ensure that cognizant
T&E authorities for acquisition programs verify that adequate T&E support for cybersecurity
requirements is planned, resourced, documented, and can be executed in a timely manner in
accordance with References (az) and (ba).
(1) Hold commanders, IS owners (ISOs), AOs, information system security managers
(ISSMs), information system security officers (ISSOs), program managers (PMs), project and
application leads, supervisors, and system administrators responsible and accountable for the
implementation of DoD security requirements in accordance with this instruction, References (
w), (bj), (bk), (bn), and (br), DoDM 5200.01, Volume 2 (Reference (bs), DoD 5220.22-R
(Reference (bt)), and supplemental DoD Component guidance. Personnel filling positions with
privileged access must be qualified and sign a Statement of Acceptance of Responsibilities in
accordance with Reference (ay).
(2) Ensure that military and civilian personnel are considered for administrative or
judicial sanctions if they knowingly, willfully, or negligently compromise, damage, or place at
risk DoD information by not ensuring implementation of DoD security requirements in
accordance with this instruction, other DoD 8500 series directives and instructions, DoD 5200
series instructions and publications, and supplemental DoD Component policies and procedures.
z. Ensure that requirements of CNSSP 300 (Reference (bu)), CNSSI 7000 (Reference (bv)),
and other DIRNSA/CHNSS-issued guidance on compromising emanations (i.e., TEMPEST) are
funded and implemented.
ab. Ensure that maintenance and disposal of information on DoD IT complies with the
provisions of DoDD 5015.2 (Reference (bw)).
14. CJCS. In addition to the responsibilities in section 13 of this enclosure, the CJCS:
a. Provides advice and assessment on joint military requirements for cybersecurity assisted
by the Joint Requirements Oversight Council in accordance with References (as) and (at).
b. Supports international cybersecurity and cyberspace defense activities of the DoD CIO.
c. Develops, coordinates, and promulgates cybersecurity policy, doctrine, and guidance for
joint and combined operations consistent with this instruction, as required.
d. Appoints a PAO for DoD ISs and PIT systems governed by the Warfighting Mission Area
as described in Reference (ac).
a. Coordinates and directs DoD Information Network (DODIN) operations and defense in
accordance with the Unified Command Plan (Reference (bx)).
b. Ensures that orders addressing cybersecurity are consistent with the policy and guidance
in this instruction and coordinated with the DoD CIO.
c. Chairs the DoD ISRMC and co-chairs the ESSG in accordance with References (ao).
ENCLOSURE 3
PROCEDURES
1. INTRODUCTION
a. The purpose of the DoD cybersecurity program is to ensure that IT can be used in a way
that allows mission owners and operators to have confidence in the confidentiality, integrity, and
availability of IT and DoD information, and to make choices based on that confidence.
(1) DoD missions and operations continue under any cyber situation or condition.
(2) The IT components of DoD weapons systems and other defense platforms perform
as designed and adequately meet operational requirements.
(3) The DoD Information Enterprise collectively, consistently, and effectively acts in
its own defense.
(4) DoD has ready access to its information and command and control channels, and
its adversaries do not.
(5) The DoD Information Enterprise securely and seamlessly extends to mission
partners.
c. In accordance with DoDD 5105.53 (Reference (bz)), the Director of Administration and
Management is responsible for providing policy, oversight, direction, and control, including
exercise of the authorities of the Secretary of Defense pursuant to chapter 159 of Reference (bd),
for the management, operation, security, protection, safety, renovation, construction, and IT of
the Pentagon Reservation and supported DoD facilities and space in the National Capital Region,
including the Raven Rock Mountain Complex and alternate sites.
2. RISK MANAGEMENT
(1) DoD will use NIST SP 800-37 (Reference (ca)), as implemented by Reference (q), to
address risk management, including authorization to operate (ATO), for all DoD ISs and PIT
systems.
(2) DoD IS and PIT systems will transition to CNSSI 1253 (Reference (cb)), NIST SP
800-53 (Reference (cc)), and Reference (ca) in accordance with transition guidance provided in
Reference (q).
STRATEGIC RISK
TIER 2
MISSION / BUSINESS PROCESSES
TIER 3
INFORMATION SYSTEMS
TACTICAL RISK
(b) The DoD ISRMC, comprising the four mission area PAOs and other major DoD
and IC stakeholders, provides the Tier 1 risk management governance for DoD.
(2) Tier 2 addresses risk from a mission and business process perspective and is guided
by the risk decisions at Tier 1, and informed and influenced by risk decisions made in Tier 3.
(a) The activities at Tier 2 begin with the design, development, and implementation
of the mission and business processes defined at Tier 1.
(b) The PAOs for each DoD mission area provide the Tier 2 governance for their
respective MAs.
(3) Tier 3 addresses risk from an IS and PIT system perspective and is guided by the risk
decisions at Tiers 1 and 2.
(a) Though the need for specific protections is identified at Tiers 1 and 2, it is at Tier
3 where the information protections are applied to the system and its environment of operation
for the benefit of successfully enabling mission and business success.
(1) Risk management tasks begin early in the system development life cycle and are
important in shaping the security capabilities of the IS. If these tasks are not adequately
performed during the initiation, development, and acquisition phases of the system development
life cycle, the tasks will, by necessity, be undertaken later in the life cycle and will be more
costly and time consuming to implement, and could negatively impact the performance of the IS.
(3) Risk management must continue during operations and sustainment. This may
include the application of new or revised security controls prior to the integration of new IT
services or products into an existing operational IS in order to maintain the security of the
operational IS.
d. DoD ISRMC. The DoD ISRMC, supported by the DSAWG, is the DoD risk executive
function as described in References (o) and (ca).
categorize system; select security controls; implement security controls; assess security controls;
authorize system; and monitor security controls.
f. Risk Assessment. Risk assessment is a key step in the organizational risk management
process. Risk assessments will be performed in accordance with the process in Reference (by)
and as described on the Knowledge Service (KS) (i.e., recommending preferred risk assessment
approaches and analysis approaches). In particular, all of the risk factors described in Reference
(by) must be used across components and agencies of the DoD to ensure reciprocity and ease of
sharing risk information. The robustness of the risk assessments may be tailored to
accommodate resource constraints and the availability of detailed risk factor information (e.g.,
threat data); however, any tailoring must be clearly explained in risk assessment reports to ensure
that AOs understand to what degree they can rely on the results of the risk assessments.
g. Security Controls. Security controls are expressed in a specified format (e.g., a control
number, a control name, control text, and enhancement text).
(1) All DoD IS and PIT systems will be categorized in accordance with Reference (cb)
and will implement a corresponding set of security controls that are published in Reference (cc)
regardless of whether they are National Security System (NSS) or non-NSS.
(2) All security controls used by DoD are published in the security control catalog in
Reference (cc), with supporting validation procedures in NIST 800-53A (Reference (cd).
(4) The DoD CIO, with direct support from NSA/CSS and DISA, and input from the
other DoD Components, works with NIST to ensure that the security control catalog remains up-
to-date and continues to represent DoD needs.
(5) Detailed guidance on DoD IS and PIT system categorization and security control
selection is provided in Reference (q).
h. Cybersecurity Reciprocity
a. Using TSN requirements and best practices to protect mission-critical functions and
components and manage risks to the integrity of critical information and communications
technology in accordance with Reference (bh) for the sustainment of IT. This includes the use of
criticality analysis, all-source threat informed acquisition, and engineering mitigations, and the
authorities prescribed in section 806 of the Ike Skelton National Defense Authorization Act for
Fiscal Year 2011(Reference (ce)). TSN processes and best practices must be applied early and
across the system development life cycle, and be applied to system acquisitions and the purchase
and integration of replacement IT as described in Reference (bh).
(2) Having mission criteria for identifying critical components and critical program
information as established in References (bh) and (aw).
e. Exercising under realistic cyber conditions and testing procedures and tactics for work-
arounds and fall-backs in the face of hostility in accordance with Secretary of Defense
Memorandum (Reference (cg)). This includes:
(1) Conducting periodic exercises or evaluations of the ability to operate during loss of
all information resources and connectivity.
(3) Being able to restore information resources rapidly to a trusted state while
maintaining support to ongoing missions.
a. Net-Centric Operations. A net-centric model provides people, services, and platforms the
ability to discover one another and connect to form new capabilities or teams without being
constrained by geographic, organizational, or technical barriers. The net-centric model allows
people, services, and platforms to work together to achieve shared ends. To be net-centric,
cybersecurity will be designed, organized, and managed such that it can work together in any
combination that events demand and maintain an expected level of readiness so that all required
cybersecurity assets can be brought to bear in a rapid and flexible manner to meet new or
changing mission needs.
b. Integration. Cybersecurity must be fully integrated into system life cycles so that it will
be a visible element of organizational, joint, and DoD Component architectures, capability
identification and development processes, integrated testing, information technology portfolios,
acquisition, operational readiness assessments, supply chain risk management, SSE, and
operations and maintenance activities.
c. Interoperability
(1) Cybersecurity products (e.g., firewalls, file integrity checkers, virus scanners,
intrusion detection systems, anti‐malware software) should operate in a net-centric manner to
enhance the exchange of data and shared security policies.
(2) Semantic, technical, and policy interoperability will be used to integrate disparate
cybersecurity products into a net-centric enterprise that can work together to create new
intelligence and make and implement decisions at network speed.
(3) Semantic, technical, and policy interoperability support products are designed to
provide security for communications between different IT systems. Interoperable
communications must be consistent with approved cryptographic design and current system
implementation standards. The objective is to ensure the seamless and secure exchange of
classified or sensitive information that is critical to the success of DoD mission goals and
objectives.
d. Standards-Based Approach. The DoD cybersecurity and cyberspace defense data strategy
will enable semantic, technical, and policy interoperability through a standards-based approach
that has been refined by many in industry, academia, and government. It is an information‐
oriented approach (see for example the security content automation protocol (SCAP) discussion
in NIST SP 800-126 (Reference (ci)).
a. DODIN Cyberspace. DoD Components that own or operate the network are generally
authorized to take cyberspace defensive actions except in cases when they would compromise
the operations of elements of cyberspace outside their responsibility. USCYBERCOM and its
subordinate headquarters (Joint Forces Headquarter-DODIN) coordinates all defensive actions
that impact more than one DoD Component or have impacts outside the realm of the network
owner. These actions are under the direction of the Commander, USCYBERCOM, in
accordance with Reference (bx) and conducted as described in Commander, USCYBERCOM,
orders or other directives such as alerts and bulletins and Reference (bg). Cybersecurity
activities are integrated and support DODIN operations as described in Reference (bg).
presentation of data that conveys current operational status to affected DoD stakeholders. DoD
Components will achieve cohesion through the use of a common continuous monitoring
framework, lexicon, and workflow as specified in NIST SP 800-137 (Reference (cj)).
e. LE and CI (LE/CI)
(1) The DoD Cyber Crime Center, as described in DoDD 5505.13 (Reference (cl)),
provides digital and multimedia forensics and specialized cyber investigative training and
services. In this role it coordinates and facilitates relationships across LE, intelligence, and
homeland security communities.
(2) DoD component LE/CI agencies deploy capabilities on the DODIN with the intent to
identify and investigate the human element posing a threat to DoD IT and DoD information.
Cybersecurity will be used in support of countering espionage, international terrorism, and the CI
insider threat in accordance with DoDI 5240.26 (Reference (cm)).
(3) DoD network administrators will accommodate all applicable legitimate and lawful
deployment of LE/CI tools and solutions. DoD LE/CI organizations in turn will make all
reasonable attempts to coordinate the implementation of LE/CI solutions with their respective
AO in a manner consistent with service-level change control processes in order to avoid any
disruption to mission critical operational tempo.
f. Insider Threat. Insider threats must be addressed in accordance with policy and
procedures published by the USD(P).
6. PERFORMANCE
accountability, and informing, making, and following through on decisions with implications for
cyberspace protection and defense.
(3) Insight and Oversight. This includes measuring, reviewing, verifying, monitoring,
facilitating, and remediating to ensure coordinated and consistent cybersecurity implementation
and reporting across all organizations without impeding local missions.
b. In addition to the structures that facilitate DoD’s major decision processes (e.g., the Joint
Chiefs of Staff Joint Capabilities Integration and Development System described in CJCSI
5123.01H (Reference (cn)), DoDD 7045.14 (Reference (co)), Reference (as)) cybersecurity
performance is facilitated by the DoD CIO Executive Board in accordance with the DoD CIO
Memorandum (Reference (cp)) and its supporting governance bodies (e.g., DoD ISRMC).
c. Strategic cybersecurity metrics will be defined, collected, and reported by the DoD CIO in
partnership with the DoD Components. DoD CIO will develop and issue guidance regarding
how cybersecurity metrics are determined, established, defined, collected, and reported.
7. DoD INFORMATION
a. The DoD Information Security Program is described in DoDI 5200.01 (Reference (cq)).
All classified information and CUI must be protected in accordance with References (bn), (bs),
(bj), and (bk). Systems processing CUI will be categorized at no less than the moderate
confidentiality impact level in accordance with Part 2002 of Title 32, Code of Federal
Regulations (Reference (z)).
b. DoD’s information sharing policies and procedures are defined in DoDD 8320.02
(Reference (cr)) and DoDI 8320.07 (Reference (cs)). Information sharing actions and activities
will be aligned with the DoD Information Sharing Operational Strategy and Guidance (see
www.dodcio.defense.gov). A security clearance held is an attribute of any identified DoD
person, and that attribute should be discovered and considered when a decision is made to share
classified information. If the information intended to be shared is not classified, then other
attributes associated with the identity of the sharing recipient may need to be discovered before
the sharing is executed.
c. The DoD cybersecurity program provides the mechanisms to measure, monitor, and
enforce information security and sharing policies and procedures as they relate to information in
an electronic form, primarily through the implementation of security controls.
d. Information systems must protect classified information and CUI from unauthorized
access by requiring authentication in accordance with Reference (ck) prior to making an access
decision.
e. All unclassified DoD information that has not been cleared for public release in
accordance with DoDD 5230.09 (Reference (ct)) and that is in the possession or control of non-
DoD entities on non-DoD ISs must be protected in accordance with DoDI 8582.01 (Reference
(cu)).
h. To enable automated sharing and protection, all DoD information must include marking
and metadata as required by References (bk), (bn) and (cr), and that information must be in the
format specified in References (bk) and (bs).
i. DoD IT that processes or stores PII or protected health information must comply with
Reference (bl), DoDI 5400.16 (Reference (cv)), and DoD 8580.02-R (Reference (cw)).
j. In accordance with Reference (cv), a privacy impact assessment is required for DoD ISs
that collect, maintain, use, or disseminate PII about members of the public, federal personnel,
contractors, or foreign nationals employed at U.S. military facilities internationally.
k. All non-DoD entities that process unclassified DoD information on non-DoD ISs, to the
extent provided by the applicable contract, grant, or other legal agreement or understanding with
DoD, must comply with applicable Defense Federal Acquisition Regulation Supplements and
will comply with Reference (cu), and, if a cleared contractor, with Reference (bf).
n. DoD information proposed or projected for publication on public Internet media (e.g.,
website, blog, social media) must be reviewed and approved for public dissemination in
accordance with Reference (ct), DoD Manual 5205.02 (Reference (cx)), and DoDI 8550.01
(Reference (cy)).
8. IDENTITY ASSURANCE
enable continuous monitoring for LE and cybersecurity. Person and non-person entity identity
policies, standards, information, infrastructure, issuance, and revocation processes and
procedures that bind the physical and digital representations of entities will incorporate measures
to ensure the integrity, authenticity, security, privacy, and availability of authoritative identity
information across the full spectrum of DoD mission environments and operations.
(1) DoD ISs will use only DoD-approved identity credentials to authenticate entities
requesting access to or within the Defense information environment. This requirement extends
to all mission partners using DoD ISs.
(2) The identification of entities accessing DoD ISs must be recorded in order to deny
anonymity and deter abuse of authorized IS access. DoD will implement capabilities to record,
track, and monitor specific entity access to networks, applications, and web servers.
b. DoD IS will employ identity assurance procedures that are aligned with the DoD Identity
Management Strategic Plan and the Identity Assurance Implementation Guidance and Roadmap
to the extent practical.
c. Information and infrastructure that support identity reliant functions, processes, and
procedures used in support of DoD operations, including but not limited to identity credentialing,
will incorporate measures to ensure the confidentiality, integrity, authenticity, and availability of
identity data or identity credentials.
d. Identity assurance policies and procedures regarding identity authentication for ISs are in
Reference (ck).
9. INFORMATION TECHNOLOGY
a. IT. Cybersecurity applies to all IT that receives, processes, stores, displays, or transmits
DoD information, as shown in Figure 2.
1. Enclave
b. Enclaves always assume the highest security category of the ISs that they
host, and derive their security needs from those systems. See Reference (ca) for a discussion of
IS boundaries and the application of security controls.
(b) DoD IS Registration. All systems will be reported in either the eMASS or ERS.
Components using alternate tools for system data are required to work with the DoD CIO to
ensure required system data can be regularly imported to ERS via an application programming
interface or other method in accordance with Reference (y). New systems will be reported in the
eMASS or ERS at the beginning of the system development life cycle.
(c) Stand-Alone Systems. DoD ISs and PIT systems that are stand-alone must be
authorized to operate, but assigned security control sets may be tailored as appropriate with the
approval of the AO (e.g., network-related controls may be eliminated).
(d) Notice and Consent Banners. Standard mandatory notice and consent banners
must be displayed at logon to all ISs and standard mandatory notice and consent provisions will
be included in all DoD IS user agreements in accordance with applicable security controls and
DoD implementation procedures in the KS. Official DoD standard notice and consent language
will be posted on the KS with copies posted to the DoD Cyber Exchange.
(2) PIT
(a) All PIT has cybersecurity considerations. The DoD cybersecurity program only
addresses the protection of the IT included in the platform. See Reference (q) for PIT
cybersecurity requirements.
(b) Examples of platforms that may include PIT are: weapons systems, training
simulators, diagnostic test and maintenance equipment, calibration equipment, equipment used in
the research and development of weapons systems, medical devices and health information
technologies, vehicles and alternative fueled vehicles (e.g., electric, bio-fuel, Liquid Natural Gas
that contain car-computers), buildings and their associated control systems (building automation
systems or building management systems, energy management system, fire and life safety,
physical security, elevators, etc.), utility distribution systems (such as electric, water, waste
water, natural gas and steam), telecommunications systems designed specifically for industrial
control systems including supervisory control and data acquisition, direct digital control,
programmable logic controllers, other control devices and advanced metering or sub-metering,
including associated data transport mechanisms (e.g., data links, dedicated networks).
(d) Owners of special purpose systems (i.e., platforms), in consultation with an AO,
may determine that a collection of PIT rises to the level of a PIT system.
1. PIT systems are analogous to enclaves but are dedicated only to the platforms
they support. PIT systems must be designated as such by the responsible OSD or DoD
Component heads or their delegates and authorized by an AO specifically appointed to authorize
PIT systems.
2. All DoD PIT systems will be categorized as defined in Reference (cb) and
authorized in accordance with Reference (q).
3. Although other federal departments and agencies may treat PIT systems as a
type of IS, DoD platforms supporting certain DoD missions have unique operational and security
needs. Due to the specialized purpose of their application, PIT systems require uniquely tailored
security control sets and control validation procedures and require security control assessors and
AOs with specialized qualifications.
4. Interconnections between PIT systems and other PIT systems or DoD ISs must
be protected either by implementation of security controls on the PIT system or the DoD IS.
5. For PIT systems that are stand-alone, assigned security control sets may be
tailored as appropriate with the approval of the AO (e.g., network-related controls may be
eliminated).
(b) IT services are net-centric and may be provided over service oriented or cloud
computing architectures and may be Internet-based.
(c) An internal IT service is implemented within DoD. The DoD entity providing the
service is responsible for the application of appropriate security controls and for ensuring that ISs
supporting service delivery are assessed and authorized in accordance with Reference (q).
Service-level agreements will be executed for internal services.
(d) An external IT service is implemented outside DoD. The DoD entity using the
external service will:
3. Ensure that all security relevant and operational status changes are reported
through the organization’s network operations chain of command to the Commander,
USCYBERCOM.
(4) IT Product
(a) Unified capability products will receive unified capability certification for
cybersecurity in accordance with Reference (am).
(b) Products that protect classified information must comply with Reference (bc).
(c) Products must meet security configuration guidance in accordance with Chapter
113 of Reference (t) and comply with the connection approval process established in Reference
(ak).
(d) Products will comply with the requirements of Reference (bh), as applicable.
(1) All acquisitions of DoD IS will comply with Reference (ar) and USD(AT&L)
Memorandum (Reference (cz)).
(2) SMs and PMs must use TSN tools, techniques, and practices, including the use of all-
source threat assessments to inform acquisition and engineering mitigation decisions, for all IT
when required in accordance with Reference (bh). During sustainment, TSN practices will be
applied prior to integrating IT into operational IS.
(3) Cybersecurity will be implemented in all system and service acquisitions at levels
appropriate to the system characteristics and requirements throughout the entire life cycle of the
acquisition in accordance with Reference (q).
(5) Each mobile code technology used in DoD information systems must undergo a risk
assessment, be assigned to a mobile code risk category, and have its use regulated based on its
potential to cause damage to DoD operations and interests if used maliciously.
(6) Ports, protocols, and services will be managed in accordance with Reference (al).
(7) DoD use of space systems will follow cybersecurity policy established in this
issuance and CNSSP 12 (Reference (db)).
(8) Disposal and destruction of classified hard drives, electronic media, processing
equipment components, and the like will be accomplished in accordance with Reference (bj),
CNSSI 4004.1 (Reference (dc)), and applicable security controls.
(10) Cryptographic products used to protect IT and the information that resides in the IT
will be acquired and implemented in accordance with Reference (be).
(11) All IA products and IA-enabled products that require use of the product's IA
capabilities will comply with the evaluation and validation requirements of Reference (bc).
(13) IT below the system level (i.e., IT services and products) will be security configured
and reviewed by the cognizant ISSM (under the direction of the AO) for acceptance and
connection into an authorized computing environment (i.e., an IS enclave with an ATO).
(15) Connections to the DISN must comply with connection approval procedures and
processes as established in Reference (ak).
(16) The ESSG will oversee development and acquisition of enterprise solutions for use
throughout DoD that support cybersecurity objectives.
(17) All persons entrusted with the management of DoD IT will be responsible for
proper use, care, physical protection, and disposal or disposition in accordance with DoDI
5000.64 (Reference (de)), DoDI 2030.02 (Reference (dg)) and, when appropriate, Reference (bj).
(18) In addition to complying with the provisions of DoDI 1035.01 (Reference (dh)):
(19) Basic input and output systems (BIOSs) will be managed in accordance with
Section 3.2 of SP 800-147 (Reference (dj)). Specifications for personal computer client systems
must include the requirement for BIOS protections compliant with Section 3.1 of Reference (dj).
(a) Vendor TPMs must be in conformance with Trusted Computing Group standards
(www.trustedcomputinggroup.org/groups/tpm) and must be approved by the procuring DoD
Component. The TPM must be turned on and ready for provisioning when the computer asset is
received from the vendor. Written justification must be provided to the responsible AO if assets
are procured without TPM technology in cases where it is available.
(b) DIRNSA will identify use cases and implementation standards and plans for DoD
to leverage TPM functionality fully to enhance IT device security, including platform integrity
verification (BIOS firmware and operating system software), platform identification and
authentication, and enhanced encryption (hardware based key generation and certificate and key
storage).
(21) DoD IT must comply with SCAP standards established in Reference (ci). STIGs
developed by DISA will use SCAP standards.
(22) All use of Internet-based capabilities will comply with References (bk), (ct), (cx),
and (cy).
(23) As the NIST and CNSS publications change, the impact of those changes will be
incorporated into the KS.
(24) All DoD IT that is designated as an NSS must comply with CNSS policy issuances.
a. The DoD Cyber Workforce Improvement Program develops and maintains a trained and
qualified cybersecurity workforce by providing a continuum of learning from basic literacy to
advanced skills, recruiting and retaining highly qualified professionals, and keeping workforce
capabilities current in the face of constant change as described in References (x) and (ay).
c. All authorized users of DoD IS must receive initial cybersecurity awareness orientation as
a condition of access and, thereafter, participate in both DoD’s and their Component’s enterprise
cybersecurity awareness program.
e. All cybersecurity positions will be assigned a position designation using the criteria found
in References (w) and (bn) and will meet the associated suitability and fitness requirements. The
position designation will be documented in the Defense Civilian Personnel Data System. Non-
U.S. citizens may not serve as ISSMs, as ISSOs, in supervisory cybersecurity positions, or be
responsible for PKI certificate issuance. Non-U.S. citizens may serve as system administrators
and perform maintenance on cybersecurity enabled products provided they are under the
immediate supervision of a U.S. citizen and meet the investigative requirements of Reference
(w).
a. Integral to the success of the DoD cybersecurity program is the promotion of systems and
communications interoperability and advancement of operational cybersecurity and cyberspace
defense relationships with all mission partners at both the unclassified and classified levels;
integration of cybersecurity and cyberspace defense activities with mission partner critical
infrastructure protection initiatives; and creating cybersecurity and cyberspace defense training
and exercise opportunities to build mission partner operational capacity, improve global cyber
situational awareness, and develop a collective global cybersecurity and cyberspace defense
workforce. This will be accomplished through the planning, negotiation, and implementation of
cybersecurity and cyberspace defense agreements with mission partners.
b. DoD will operate a PKI for use by foreign national mission partners to communicate with
Combatant Commands that will enable use of digital signature, encryption, and PKI-based
authentication and be implemented and operated in accordance with DoD Coalition Public Key
Infrastructure, X.509 Certificate Policy (Reference (dk)).
(1) Access to DoD ISs is authorized only by the DoD Component head in accordance
with DoD, Department of State, and ODNI disclosure guidance, as applicable.
(2) Mechanisms are in place to limit access strictly to information that has been cleared
for release to the represented foreign nation, coalition, or international organization (e.g., North
Atlantic Treaty Organization) in accordance with Reference (ab) for classified military
information, and other policy guidance for unclassified information such as References (bk),
(dg), DoDD 5230.20E (Reference (dl)), and DoDI 5230.27 (Reference (dm)).
d. Capabilities built to support cybersecurity objectives that are shared with mission partners
will be governed through integrated decision structures and processes described in this
instruction, must have formal agreements (e.g., a memorandum of agreement, memorandum of
understanding, service-level agreements, contracts, grants, or other legal agreements or
understandings) that incorporate considerations for DoD risks, be in accordance with Reference
(ak), and will be consistent with applicable guidance contained in References (ab), (bj), (bk),
(bp), (bn), (bs), and DoDI 2040.02 (Reference (dn)).
e. Information systems jointly developed by DoD and mission partners are considered DoD-
partnered systems. The cybersecurity risk management considerations for DoD-partnered
systems are provided in Reference (q).
12. DoD SISO. On behalf of the DoD CIO, the DoD SISO:
a. Directs and coordinates the DoD cybersecurity program and carries out the DoD CIO’s
responsibilities pursuant to section 3554 of Reference (aa) that include but are not limited to:
(3) Assisting senior DoD and DoD Component officials concerning their responsibilities
in paragraph (2) of section 3554 of Reference (aa).
b. Serves as the DoD CIO’s primary liaison to DoD AOs, ISOs, and ISSOs.
e. Maintains liaison with DNI CIO to ensure continuous coordination of DoD and IC
cybersecurity activities and programs.
f. Maintains liaison with NIST to ensure continuous coordination and collaboration on NIST
cybersecurity-related issuances.
g. Provides guidance and oversight in the development, submission, and execution of the
DoD cybersecurity program budget and advocates for DoD-wide cybersecurity solutions
throughout the planning, programming, budget, and execution process.
i. Collects and reports cybersecurity metrics in coordination with the DoD Component heads
as required by section 3555 of Reference (aa).
(1) Supporting the USD(AT&L) in ensuring the DoD acquisition process incorporates
cybersecurity planning, implementation, and testing consistent with References (p), section 3554
of (aa), (q), (ar), (at), and this instruction.
k. Coordinates with the DOT&E to ensure cybersecurity testing and evaluation is integrated
into the DoD acquisition process in accordance with References (ba), and other DOT&E policies
and guidance.
m. Provides recommended updates and additions to NIST for security controls that are
published in Reference (cc) and for supporting validation procedures published in Reference (cd)
with direct support from NSA/CSS and DISA, and input from the other DoD Components.
n. Provides recommended updates and additions to the security control baselines and
overlays that are published in Reference (cb) and used by DoD with direct support from
NSA/CSS and DISA, and input from the other DoD Components.
r. Manages and executes DoD DIB Cybersecurity Program activities in accordance with
Reference (ad).
a. On behalf of the respective DoD Component heads, develop, implement, maintain, and
enforce a DoD Component cybersecurity program that is consistent with the strategy and
direction of the DoD SISO and the DoD cybersecurity program, and compliant with this
instruction.
b. Appoint DoD Component SISOs to direct and coordinate their DoD Component
cybersecurity program.
c. When code signing certificates are used to establish provenance of software code,
implement a process to designate individuals authorized to receive code-signing certificates and
ensure that such designations are kept to a minimum consistent with operational requirements.
d. Partner with DoD Component Acquisition Executives to ensure that all IT is acquired in
accordance with DoD cybersecurity policy and that program risk relating to the development of
cybersecurity requirements is assessed, communicated to the Milestone Decision Authority and
managed early in the system development life cycle.
14. DoD RISK EXECUTIVE FUNCTION. The risk executive function, as described in
Reference (ca), is performed by the DoD ISRMC. The DoD risk executive:
a. Ensures risk-related considerations for individual ISs and PIT systems, including
authorization decisions, are viewed from a DoD-wide perspective with regard to the overall
strategic goals and objectives of DoD in carrying out its missions and business functions.
b. Ensures that management of IT-related security risks is consistent across DoD, reflects
organizational risk tolerance, and is considered along with other organizational risk in order to
ensure mission or business success.
a. Oversee and establish guidance for the strategic implementation of cybersecurity and risk
management within their MAs.
b. Appoint flag-level (e.g., general officer, senior executive) PAO representatives to, and to
oversee, the DoD ISRMC.
c. Assist the DoD CIO and DoD SISO in assessing the effectiveness of DoD cybersecurity.
a. Ensure that:
(1) For DoD ISs and PIT systems under their purview, cybersecurity-related
b. Render authorization decisions for DoD ISs and PIT systems under their purview in
accordance with Reference (q).
c. Establish guidance for and oversee IS-level risk management activities consistent with
Commander, USCYBERCOM, and DoD Component guidance and direction.
d. Must be U.S. citizens and DoD officials with the authority to assume responsibility
formally for operating DoD ISs or PIT systems at an acceptable level of risk to organizational
operations (including mission, functions, image, or reputation), organizational assets,
individuals, other organizations, and the Nation.
a. Plan and budget for security control implementation, assessment, and sustainment
throughout the system life cycle, including timely and effective configuration and vulnerability
management.
b. Ensure that SSE is used to design, develop, implement, modify, and test and evaluate
the system architecture in compliance with the cybersecurity component of the DoD Enterprise
Architecture (as described in Reference (r)) and to make maximum use of enterprise
cybersecurity.
d. Coordinate with the DoD Component TSN focal point to ensure that TSN best practices,
processes, techniques, and procurement tools are applied prior to the acquisition of IT or the
integration of IT into ISs when required in compliance with Reference (bh).
b. Ensure that information owners and stewards associated with DoD information
received, processed, stored, displayed, or transmitted on each DoD IS and PIT system are
identified in order to establish accountability, access approvals, and special handling
requirements.
d. Ensure that ISSOs are appointed in writing and provide oversight to ensure that they are
following established cybersecurity policies and procedures.
e. Monitor compliance with cybersecurity policy, as appropriate, and review the results
of such monitoring.
f. Ensure that cybersecurity inspections, tests, and reviews are synchronized and coordinated
with affected parties and organizations.
h. Ensure that the handling of possible or actual data spills of classified information resident
in ISs, are conducted in accordance with Reference (bj).
i. Act as the primary cybersecurity technical advisor to the AO for DoD IS and PIT systems
under their purview.
j. Ensure that cybersecurity-related events or configuration changes that may impact DoD
IS and PIT systems authorization or security posture are formally reported to the AO and other
affected parties, such as information owners and stewards and AOs of interconnected DoD ISs.
k. Ensure the secure configuration and approval of IT below the system level (i.e., products
and IT services) in accordance with applicable guidance prior to acceptance into or connection to
a DoD IS or PIT system.
b. Implement and enforce all DoD IS and PIT system cybersecurity policies and procedures,
as defined by cybersecurity-related documentation.
c. Ensure that all users have the requisite security clearances and access authorization, and
are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview
a. Configure and operate IT within the authorities vested in them according to DoD
cybersecurity policies and procedures.
b. Notify the responsible ISSO or, in the absence of an ISSO, the responsible ISSM, of
any changes that might affect security posture.
a. Immediately report all cybersecurity-related events (e.g., data spill) and potential threats
and vulnerabilities (e.g., insider threat) to the appropriate ISSO or, in the absence of an ISSO, the
ISSM.
c. Protect terminals, workstations, other input or output devices and resident data from
unauthorized access.
d. Inform the responsible ISSO when access to a particular DoD IS or PIT system is no
longer required (e.g., completion of project, transfer, retirement, resignation).
e. Observe policies and procedures governing the secure operation and authorized use of
DoD IT, including operations security in accordance with Reference (cx) and DoDD 5205.02E
(Reference (dp)).
h. Not introduce or use software, firmware, or hardware that has not been approved by the
AO or a designated representative on DoD IT.
GLOSSARY
AO authorizing official
ASD(NII) Assistant Secretary of Defense for Networks and Information
Integration
ATO authorization to operate
IA information assurance
IC Intelligence Community
IS information system
ISO information system owner
ISSM Information System Security Manager
ISSO Information System Security Officer
IT information technology
KS Knowledge Service
Unless otherwise noted, these terms and their definitions are for the purposes of this instruction.
cyberspace defense. Defined in the DoD Dictionary of Military and Associated Terms
(Reference (dr)).
DoD-controlled. Used only for DoD purposes, dedicated to DoD processing, and effectively
under DoD configuration control.
DoD information. Any information that has not been cleared for public release in accordance
with Reference (ct) and that has been collected, developed, received, transmitted, used, or stored
by DoD, or by a non-DoD entity in support of an official DoD activity.
DoD IT. DoD-owned IT and DoD-controlled IT. DoD IT includes IS, PIT, IT services, and IT
products.
DoD-partnered systems. ISs or PIT systems that are developed jointly by DoD and non-DoD
mission partners, comprise DoD and non-DoD ISs, or contain a mix of DoD and non-DoD
information consumers and producers (e.g., jointly developed systems, multi-national or
coalition environments, or first responder environments).
ISO. Defined in Reference (ca), but for the purposes of this instruction is not synonymous with
“PM” as indicated in Reference (ca).
mobile code risk categories. Categories of risk associated with mobile code technology based on
functionality, level of access to workstation, server, and remote system services and resources,
and the resulting threat to information systems.
operational resilience. The ability of systems to resist, absorb, and recover from or adapt to an
adverse occurrence during operation that may cause harm, destruction, or loss of ability to
perform mission-related functions.
PIT. IT, both hardware and software, that is physically part of, dedicated to, or essential in real
time to the mission performance of special purpose systems.
PIT system. A collection of PIT within an identified boundary under the control of a single
authority and security policy. The systems may be structured by physical proximity or by
function, independent of location.
policy interoperability. Common business processes related to the transmission, receipt, and
acceptance of data among participants.
PM or SM. The individual with responsibility for a0nd authority to accomplish program or
system objectives for development, production, and sustainment to meet the user’s operational
needs.
semantic interoperability. The ability of each sending party to communicate data and have
receiving parties understand the message in the sense intended by the sending party.
SISO. See “Senior (Agency) Information Security Officer” definition in Reference (aa).
SRG. Compilation of CCIs grouped in more applicable, specific technology areas at various
levels of technology and product specificity. Contain all requirements that have been flagged as
applicable from the parent level regardless if they are selected on a DoD baseline or not.
stand-alone system. System that is not connected to any other network and does not transmit,
receive, route, or exchange information outside of the system’s authorization boundary.
STIG. Based on DoD policy and security controls. Implementation guide geared to a specific
product and version. Contains all requirements that have been flagged as applicable for the
product which have been selected on a DoD baseline.
technical interoperability. The ability for different technologies to communicate and exchange
data based on well-defined and widely adopted interface standards.
TPM. The TPM is a microcontroller that stores keys, passwords, and digital certificates. It
typically is affixed to the motherboard of computers. It potentially can be used in any computing
device that requires these functions. The nature of this hardware chip ensures that the
information stored there is made more secure from external software attack and physical theft.
The TPM standard is a product of the Trusted Computing Group consortium. For more
information on the TPM specification and architecture, refer to
www.trustedcomputinggroup.org/groups/tpm.