№ lp_1_2_56921
File format: docx
Character count: 20327
File size: 62 KB
Outline and guidance document detailing the structure, lifecycle management, and implementation expectations of cybersecurity strategies for defense acquisition systems, including planning, testing, authorization, and sustainment activities.
Year:
2021
Organization:
Department of Defense
Department:
Chief Information Officer
Document Type:
Guidance/Strategy Outline
Topic:
Cybersecurity
Version:
1.4
Audience:
Program Offices, System Owners, Authorizing Officials
Legal References:
Clinger-Cohen Act (40 U.S.C. Subtitle III), NDAA 2001 §811, DoDI 5000.02
Related Documents:
DoDI 8500.01, DoDI 8510.01, DoDI 8580.01, DoDI 8330.01, DoDI 8530.01, DoDI 5200.44, NIST SP 800-53 Rev. 4, NIST SP 800-82 Rev. 2, NIST SP 800-160 Vol. 1 & 2, NIST SP 800-161
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.
The file will be delivered to the email address provided at checkout within 12 hours.
Don’t have cryptocurrency yet?
You can still complete your purchase in a few minutes:- Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
- In the app, tap Send.
- Select network, paste our wallet address.
- Send the exact amount shown above.
The final amount may vary slightly depending on the payment method.
The file will be sent to the email address provided at checkout within 24 hours.
The product description is provided for reference. Actual content and formatting may differ slightly.
Year:
Not specified
Organization:
University of Washington
Document Type:
System Security Plan
Audience:
Internal staff handling FCI and CUI
Scope:
Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)
Sections Included:
Environment Profile, Environment and Assets, Access Control Practices
Technical Controls:
ASTRA Access Management, Active Directory, Azure AD, Husky OnNet VPN, DUO 2-Factor Authentication, Kerberos, LDAP, UW Groups, UW NetID, Web SSO
Procedures:
User access management, device approval, external connection controls, public information control
Year:
2007
Region / city:
United States
Subject:
Encryption of unclassified data at rest
Document Type:
Policy Memorandum
Organization:
Department of Defense
Author:
Not specified
Target audience:
DoD personnel, contractors, and other related stakeholders
Period of validity:
Ongoing
Approval date:
July 3, 2007
Amendment date:
Not specified
Year:
2023
Region / City:
United States
Topic:
Immigration, Security, International Visitors
Document Type:
Questionnaire
Organization / Institution:
U.S. Department of Energy
Author:
U.S. Department of Energy
Target Audience:
Foreign nationals visiting or assigned to the Department of Energy
Period of validity:
Not specified
Approval Date:
Not specified
Amendment Date:
Not specified
Year:
2012
Country:
United States
Subject:
Information security
Document type:
Policy and requirements specification
Issuing organization:
Department of Defense
Information designation:
Controlled Unclassified Information (CUI), For Official Use Only (FOUO)
Applicable regulations:
Executive Order 13526; Privacy Act of 1974; DoD 5200.01 Vol. 4; DoD 8582.01
Affected parties:
DoD contractors, grantees, and non-DoD entities
Scope:
Unclassified DoD information on non-DoD information systems
Security domains:
Access control, encryption, transmission, storage, dissemination
Effective date:
February 24, 2012
Year:
2018
Region / City:
Jersey
Subject:
Data Protection
Document Type:
Application Form
Organization / Institution:
Jersey Financial Services Commission
Author:
Jersey Financial Services Commission
Target Audience:
Fund applicants, financial services professionals
Period of Validity:
Not specified
Approval Date:
Not specified
Date of Changes:
Not specified
Document Type:
Policy Guidance
Subject:
Controlled Unclassified Information (CUI)
Issuing Authority:
U.S. Government
Applicable Regulation:
Army Regulation (AR) 25-55
Related Regulation:
DFARS 252.204-7012
Related Standard:
AR 25-2
Related Instruction:
BBP 03-PE-O-0003 Army Information Assurance Sanitization of Media
Applicable Designations:
For Official Use Only (FOUO)
Scope:
Technical Data and Government Information
Applicability:
DoD Personnel and DoD Contractors
Access Requirement:
Need-to-Know Basis
Security Oversight:
Government Security Manager
Reporting Requirement:
Loss or Compromise within 72 Hours
Distribution Control:
Applicable Distribution Statement Required
Digital Transmission Requirement:
NIST/NIAP-Approved Cryptographic Products
Year:
2024
Region / City:
United States
Topic:
Cybersecurity, Incident Response
Document Type:
Template
Organization / Institution:
HACS
Author:
HACS
Target Audience:
Contractors, Agencies
Validity Period:
Ongoing
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2021
Region / City:
Massachusetts
Topic:
Cybersecurity, Public Water Supply
Document Type:
Template
Organization / Institution:
Massachusetts Department of Environmental Protection (MassDEP)
Author:
Andrew Hildick-Smith
Target Audience:
Public water and wastewater utilities
Effective Period:
Ongoing
Approval Date:
2021
Date of Last Update:
N/A
Year:
2022
Month:
June
Document status:
Draft
Document identifier:
IMDRF/CYBER WG/N73DRAFT:2022
Topic:
Medical device cybersecurity
Subject:
Software Bill of Materials (SBOM)
Document type:
Regulatory guidance
Authoring group:
Medical Device Cybersecurity Working Group
Organization:
International Medical Device Regulators Forum
Intended stakeholders:
Medical device manufacturers; healthcare providers; regulators; software vendors
Scope:
Medical devices including software-based and in vitro diagnostic devices
Related documents:
IMDRF/CYBER WG/N60FINAL:2020
Copyright holder:
International Medical Device Regulators Forum
Year:
2021
Region / city:
Washington, D.C.
Topic:
Cybersecurity, Automotive Recycling, Vehicle Repair
Document Type:
Letter
Organization:
National Highway Traffic Safety Administration (NHTSA)
Author:
Sandy Blalock, Executive Director
Target Audience:
National Highway Traffic Safety Administration (NHTSA), Automotive Manufacturers
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2023
Region / City:
United States
Theme:
Cybersecurity, Workforce Development
Document Type:
Interview
Organization:
U.S. Department of Homeland Security (DHS)
Author:
Gregory Bird
Target Audience:
Cybersecurity professionals, Human Resources in cybersecurity
Period of Action:
Ongoing
Approval Date:
Not provided
Date of Changes:
Not provided
Year:
2017
Region / city:
Federal Government
Topic:
Cybersecurity, Information Technology
Document type:
Policy Document
Agency / organization:
Office of Personnel Management (OPM)
Author:
Office of Personnel Management (OPM)
Target audience:
Federal agencies, cybersecurity professionals
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2026
Region / City:
N/A
Subject:
Cybersecurity Training
Document Type:
Instructional Guide
Organization / Institution:
DARS
Author:
N/A
Target Audience:
Employees of DARS
Action Period:
N/A
Approval Date:
N/A
Date of Changes:
N/A
Year:
2025
Organization:
NAIC (National Association of Insurance Commissioners)
Project Sponsor:
Miguel Romero
Prepared by:
Koty Henry
Target Audience:
State insurance regulators and licensed insurers
Type of Document:
Project Proposal / Implementation Plan
Relevant Legislation:
Insurance Data Security Model Law #668 (MDL #668)
Related Policy:
Cybersecurity Event Response Plan (CERP), March 17, 2024
Submission Date:
05/26/2025
Key Resources:
NAIC technical and cybersecurity teams, regulatory/legal input, business analysts, project managers, training/support staff, infrastructure (servers/cloud services)
Implementation Steps:
Portal development, testing, deployment, and state utilization survey
Goals:
Centralized reporting of cybersecurity events, improved regulatory compliance, data security, and cross-jurisdiction coordination
Risks/Challenges:
State-specific variations, adoption rate, confidentiality and security validation
Existing Alternatives:
Appian platform or other configurable platforms
Note:
Year
Topic:
Cybersecurity
Document Type:
Template
Organization:
Harbour Investments, Inc.
Target Audience:
Financial advisors, cybersecurity professionals
Year:
2026
Region / City:
United States
Topic:
Cybersecurity, Compliance
Document Type:
Request for Proposal
Agency / Institution:
U.S. Department of Defense
Author:
Unspecified
Target Audience:
Organizations handling Controlled Unclassified Information (CUI)
Period of Application:
Ongoing
Approval Date:
Unspecified
Modification Date:
Unspecified
Year:
2014
Region/City:
United States
Topic:
Cybersecurity
Document Type:
Statement of Work (SOW)
Organization:
Federal Government, Department of Defense (DoD), Intelligence Community (IC)
Author:
Not specified
Target Audience:
Federal agencies, Contractors
Period of Effectiveness:
Not specified
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2023
Region / City:
USA
Topic:
Cybersecurity Services, Risk Assessment, Vulnerability Testing
Document Type:
Template
Agency/Institution:
HACS
Author:
HACS
Target Audience:
Federal Agencies, Contractors
Period of Action:
N/A
Approval Date:
N/A
Modification Date:
N/A
Note:
RFQ Number
Issued to:
Contractors under GSA Multiple Award Schedule (MAS IT)
Type of Document:
Federal solicitation / request for quote
Services:
Highly Adaptive Cybersecurity Services (HACS)
Applicable Regulations:
Federal Acquisition Regulation (FAR) 8.4
NAICS Code:
[Not specified]
PSC Code:
[Not specified]
Performance Location:
[Primary work location specified in RFQ]
Period of Performance:
Base period with option periods from date of award
Overtime Policy:
Approved only by Contracting Officer’s Representative (COR)
Holidays Observed:
Federal holidays and additional days designated by statute, executive order, or proclamation
Submission Requirements:
Signed cover letter by authorized company negotiator