Ports and Protocols FAQ

Size: px
Start display at page:

Download "Ports and Protocols FAQ"

Transcription

1 CLASSIFICATION: UNCLASSIFIED Ports and Protocols FAQ 1. What is the timeline for closing ports and protocols? 2. What TCP/UDP ports are affected? 3. What about ports ,535? 4. Will outbound data requests be affected by the Ports and Protocols Program? 5. What about protocols? 6. If DoD is going to close a port, can I change the port the service or application uses to a port number that is open? 7. Who has access to the Ports and Protocols Registration System? 8. Who are the authorized organizational POC's? 9. What if a DoD Component POC doesn't have access to the SIPRNET? 10. How do I register my Ports and Protocols Utilization? 11. If another Component has an approved waiver for a port that I am also interested in, do I need to submit a waiver request? 12. What happens if, at 0200 hours, I discover that a port has been closed and I need it opened immediately? 13. What are the guidelines being used to determine that a port will be opened? 14. If a DoD Component requires a port to be opened, will it be opened only for that Component? 15. What will happen to the DoD Ports and Protocols Program if the DoD undertakes significant operational missions? 16. What about backdoors and non-niprnet DoD networks? 17. Where can I find additional information? 18. What happens after a Component POC submits a request? 19. What happens after the DSAWG makes a decision on a system? 20. What is the Appeal process? 21. Does the DoD PnP Program affect DoD-to-DoD network traffic? What is the timeline for closing ports and protocols? The inbound port blocking will commence approximately 13 April 2003, (60 days following the release of the implementation message by STRATCOM, which was released on 13 February 2003). (1 of 9)6/1/2005 6:57:26 AM

2 The JTF-GNO will start with ports on approximately 13 April The remainder of ports will be based on the success of the first block closures. It is intended to increase the number of ports closed into larger blocks in order to facilitate completing the process. Inbound transport layer protocol blocking will begin following the initial port blocking effort. What TCP/UDP ports are affected? Only inbound requests for ports in the range What about ports ,535? A few selective ports are blocked if they represent a clear and present danger to DoD networks. Blocking all of the high ports would cause the TCP/IP protocol suite to fail resulting in the NIPRNET failing to operate. Will outbound data requests be affected by the Ports and Protocols Program? The Ports and Protocols Program only deals with inbound requests at this time. Outbound requests are not addressed. What about Protocols? (2 of 9)6/1/2005 6:57:26 AM

3 DoD Components are required to register automated information systems (AIS), as well as their associated transport layer protocols (TCP, UDP, etc.) in the DoD Ports and Protocol Registration System. Transport layer protocols that are not registered will be denied at the Internet access points. At this time, due to technical limitations, we are not able to differentiate between TCP and UDP port numbers on the router access control lists. In the very near future, we will be able to differentiate protocols on every port at the Internet gateways, and therefore need to ensure the proper protocols are registered in the database. If DoD is going to close a port, can I change the port the service or application uses to a port number that is open? No! Reassigning an application or service port number from its normal well known port number to another port number is call port redirection. In accordance with the DoD NIPRNET Ports, Protocols, and Services (PPS) Security Technical Guidance, section 4.4; recognized data services should operate on their accepted well known (system) ports they should not be redirected. For a complete listing of well known port numbers and associated services, please visit Who has access to the Ports and Protocols Registration System? DoD Component-authorized POCs designated to the JTF-GNO will be issued a logon ID and Password. The Primary POC for each Component may add or remove secondary POCs as necessary. If you have any questions on Registration System access contact DISA at baseld@ncr. disa.mil. (3 of 9)6/1/2005 6:57:26 AM

4 Who are the authorized organizational POC's? The PnP Points of Contact are posted on the introduction page. What if a DoD Component POC doesn't have access to the SIPRNET? A Microsoft Excel spreadsheet was developed that mirrors the requirements for the Registration System. Component POCs will complete the spreadsheet with the information required for submitting a waiver request. The POC will this completed spreadsheet to baseld@ncr.disa. mil. This information will be entered into the DoD PNP Registration System. Queries on a PNP request status and copies of the spreadsheet may be obtained by contacting baseld@ncr.disa.mil (703) How do I register my Ports and Protocols utilization? 1) As the authorized Component POC, you will be provided with an ID and Password based upon the information provided to the JTF-GNO 2) You will receive an with your Login and Password information and procedures on the SIPRNET. 3) Enter the information into the Login screen on pnp.cert.smil.mil (if you do not have access to the SIPRNET, see above FAQ entry). 4) Enter ports and protocol requests information into the registration system. 5) Ensure your system is accredited IAW the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) DODI ) Check back later to verify request status. If another Component has an approved request for a port or protocol that I (4 of 9)6/1/2005 6:57:26 AM

5 am also interested in, do I need to submit a request? Yes! Should the other Component remove the request, or the DSAWG later revoke the request, and no other port/protocol request are contained within the registration system, the JTF-GNO would order the port/protocol blocked. What happens if, at 0200 hours, I discover that a port/protocol is being blocked and I need it opened immediately? The component should go through normal process to debug the problem, usually working through the DISA GNOSC. If it is discovered that the problem is a closed port, the component or GNOSC will contact the JTF-GNO watch officer and inform the watch officer of the port. The JTF-GNO watch officer will order the port opened. The DISA GNOSC will direct the port opened. Be advised, it will take at least 2 hours to open a port. The JTF-GNO will direct either to open only that port, or rollback the entire router access control list (ACL). This decision will be based on the criticality of the service or application. A Component POC will have 30 days to submit a formal request using the process specified in this document. Should the Component fail to submit the request the port will be closed. Should the Component submit a request for a service/application that was denied by the CCB, the JTF- GNO will not open that port. What are the guidelines being used to determine that a port or protocol will be opened? IAW the DoD NIPRNET Ports, Protocols, and Services (PPS) Security Technical Guidance, section E5.2, to obtain approval, a DoD Information System-related port or protocol must: Demonstrate a need to exist. (5 of 9)6/1/2005 6:57:26 AM

6 Not conflict with other ports or protocols. Not increase security risks associates with specific ports and protocols Comply with DoD instructions and the prescribed approval process. Use approved ports and protocols in a manner approved by a designated authority (the DoD CCB). Comply with required testing and/or vulnerability assessment procedure for new DoD information systems prior to approval. A port/protocol will be opened only if the DSAWG determines that the port/protocol is being used by a DoD mission critical and properly registered Automated Information System (AIS). It is the responsibility of the Component Ports and Protocols POC to express the importance of the port/service/application in the DoD Accreditation System. Additionally, it is the responsibility of the components to ensure all port/protocol requests are associated with an accredited AIS. If a Component requires a port to be opened, will it be opened only for that Component? No. Once the DSAWG determines that a Port is being used by a legitimate mission critical application or service, the port will be open for all. What will happen to the DoD Ports and Protocols Program if the DoD undertakes significant operational missions? The Commander JTF-GNO (CJTF) will constantly reevaluate the PNP initiative based on DoD operational tempo (OPTEMPO). Should the CJTF decide that continued implementation of the PNP initiative might have detrimental effects on current operations it will order a strategic pause until operations slow. The JTF-GNO will contact all POCs if this action is necessary. (6 of 9)6/1/2005 6:57:26 AM

7 What about backdoors and non-niprnet DoD networks? The DoD Ports and Protocols Program pertains to all DoD Internet access points all points connected to the Internet. All routers connected to the Internet must be as secure as directed by the DoD Ports and Protocols program. Where can I find additional information? The information on this web page will be updated frequently. Additional information can be obtained on the SIPRNET at Finally, there is a DoD Ports and Protocol Workshop for DoD Component POCs on 28 March Contact the JTF-GNO POC for more information. What happens after a Component POC submits a request? The JTF-GNO will not direct a port/protocol blocked if a there is a pending request from any DoD Component for a system that utilizes that port or protocol. Requests are consolidated by the Technical Applications Group (TAG) and passed to the PNP Configuration Control Board (CCB). The CCB will process requests by automated information system (AIS), in IP ranges as specified by the JTF-GNO. Any system that utilizes a port in that IP range will be reviewed by the CCB. The CCB, utilizing the TAG, will contact the system owners as specified in the PNP Registration System (typically the program manager or designated approval authority). The CCB will verify that the system is accredited, has a valid operational necessity, and will review operational impact if denied. Finally, the CCB will provide a recommendation to the DSAWG to approve or disapprove the request. The DSAWG will then make a decision on approving or disapproving the port utilization by the system (7 of 9)6/1/2005 6:57:26 AM

8 in question. What happens after the DSAWG makes a decision on a system? The DSAWG will approve or disapprove the system, and in some cases validate the decision with the DISN Flag Panel. The DSAWG will forward the results to the CCB. The CCB will forward the decision by to the relevant Component POC and the JTF-GNO. Finally the CCB will update the status of the request in the PnP Registration System to "Approved" or "Disapproved". Each decision will be valid for a specified period of time, normally 12 months. One of two actions may occur: 1. If the DSAWG approves the request, the ports/protocols used by that request will remain open for the time specified by the DSAWG. Before the exception approval expires the Component POC must resubmit the request to ensure the ports/protocols remain opened. Such resubmissions will be processed following the same registration process. 2. If the DSAWG disapproves a request, a Component POC has 30 days from the date of the DSAWG decision to submit an appeal to the DISN Flag Panel (see below). After 30 days, should an appeal not be submitted and no outstanding requests exist that utilizes those ports, the JTF-GNO will order the DISA GNOSC and all components that maintain Internet gateways to deny the port(s)/protocol(s). Once an appeal is submitted, the JTF-GNO will not take action until the DISN Flag Panel adjudicates the appeal. What is the Appeal process? Should a Component wish to present an appeal to the DISN Flag Panel, they should contact the DSAWG Chair directly, and, if appropriate, inform their representative on the DSAWG. More information on the DSAWG can be found at Under most circumstances the Component POC will be required to present an appeal in person to the DISN Flag Panel. IAW the direction of the ASD-C3I, as the DoD CIO, the decision of the DISN Flag Panel is final. Additional details on the appeals process will be added soon. (8 of 9)6/1/2005 6:57:26 AM

9 Does the DoD PnP program affect DoD-to-DoD network traffic? No. The DoD PnP Program only affects the DoD Internet access points - all points connected to the Internet. All routers connected to the Internet must be as secure as directed by the DoD Ports and Protocols program. CLASSIFICATION: UNCLASSIFIED (9 of 9)6/1/2005 6:57:26 AM

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"

More information

Ports, Protocols, and Services Management Process for the Department of Defense. Dana Foat Defense-Wide Information Assurance Program Office

Ports, Protocols, and Services Management Process for the Department of Defense. Dana Foat Defense-Wide Information Assurance Program Office Software Engineering Technology David R. Basel Defense Information Systems Agency Ports, Protocols, and Services Management Process for the Department of Defense Dana Foat Defense-Wide Information Assurance

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This

More information

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC

More information

SIPRNet Contractor Approval Process (SCAP) December 2011 v2. Roles and Responsibilities

SIPRNet Contractor Approval Process (SCAP) December 2011 v2. Roles and Responsibilities Roles and Responsibilities PARTICIPANT RESPONSIBILITIES Defense Security Service (DSS) DAA for Information Systems (IS) used to process classified information in the National Industrial Security Program

More information

ICE. Office of Investigations SEVP. Recertification

ICE. Office of Investigations SEVP. Recertification Recertification 1 Agenda Overview Before Recertification Recertification process Question and Answer Session 2 Recertification Simple process Risk management Overview School Officials Review data for accuracy

More information

Partner Information Manager Supplier Guide October 2017

Partner Information Manager Supplier Guide October 2017 Partner Information Manager Supplier Guide October 2017 Copyright 2017 Exostar, LLC All rights reserved. Contents Exostar s Partner Information Manager (PIM)... 2 Cybersecurity Questionnaire... 2 NIST

More information

CONNECTION PROCESS GUIDE

CONNECTION PROCESS GUIDE Defense Information Systems Agency A Combat Support Agency NETWORK SERVICES DIRECTORATE (NS) CONNECTION APPROVAL DIVISION (NSC) CONNECTION PROCESS GUIDE Version 3 May 2010 Defense Information Systems Agency

More information

Part 1: Items that Contracted Parties Need from ICANN before May 25 - Prior to Implementation

Part 1: Items that Contracted Parties Need from ICANN before May 25 - Prior to Implementation Contracted Parties House GDPR Discussion Group Input to ICANN on Implementation Timeline for Interim GDPR Compliance Model March 26, 2018 Introduction In response to ICANN Staff s request during ICANN

More information

Gradintelligence student support FAQs

Gradintelligence student support FAQs Gradintelligence student support FAQs Account activation issues... 2 I have not received my activation link / I cannot find it / it has expired. Please can you send me a new one?... 2 My account is showing

More information

Training Manual for HR Managers ( Business Unit Admin level)

Training Manual for HR Managers ( Business Unit Admin level) UK Umbrella Service Ltd online DBS applications Training Manual for HR Managers ( Business Unit Admin level) UK Umbrella Service Ltd Page 1 of 12 1 Accessing the system: From the Log In page: https://ukdbschecks.employmentcheck.org.uk/user_login.php

More information

1st Reviewer. Last Updated: March 31, 2015

1st Reviewer. Last Updated: March 31, 2015 1st Reviewer Last Updated: March 31, 2015 Table of Contents Introduction... 3 Roles... 4 Login... 5 Main Screen... 6 Home menu... 7 Search for an Equivalency Request... 8 Search for an Equivalency Request

More information

E X O S T A R L L C D A T E : N O V E M B E R V E R S I O N : 2.0

E X O S T A R L L C D A T E : N O V E M B E R V E R S I O N : 2.0 SECURE ACCESS MAN AG E R PRO VIDER AD M I NISTRAT I ON GUI DE E X O S T A R L L C D A T E : N O V E M B E R 2 0 1 6 V E R S I O N : 2.0 1 S E C U R E A C C E S S M A N A G E R SECURE ACCESS MANAGER OVERVIEW...

More information

BEEDS portal Bank of England Electronic Data Submission portal. User guide. New PRA Authorisations Version 1.1

BEEDS portal Bank of England Electronic Data Submission portal. User guide. New PRA Authorisations Version 1.1 BEEDS portal Bank of England Electronic Data Submission portal User guide New PRA Authorisations Version 1.1 May 2018 Contents Document versions 3 1. Introduction 3 a. Bank of England contact details 4

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST

More information

Delegation for Approving Human Resources Transactions on My HUB

Delegation for Approving Human Resources Transactions on My HUB Delegation for Approving Human Resources Transactions on My HUB Manage Delegation Introduction Submitting a Delegation Request Reviewing Proxies Reviewing and Accepting Delegation Authorities Frequently

More information

Section K: Registration Error Override Request System

Section K: Registration Error Override Request System Section K: Registration Error Override Request System 1. REGISTRATION ERROR OVERRIDE SYSTEM... 2 1. 1 INTRODUCTION... 2 1. 2 THE NEW AND IMPROVED SYSTEM... 2 2. CARLETON CENTRAL PAGES... 6 2.1 REGISTRATION

More information

PearsonAccess User Guide PARCC

PearsonAccess User Guide PARCC PearsonAccess User Guide PARCC Copyright 2013, Pearson Education, Inc. Published December 16, 2013 1.0 Document Revisions... 5 2.0 Getting Started... 6 2.1 Getting Started - Introduction... 7 2.2 Getting

More information

AVAYA LEARNING CENTER END USER GUIDE. Avaya Learning License Registration Guideline

AVAYA LEARNING CENTER END USER GUIDE. Avaya Learning License Registration Guideline AVAYA LEARNING CENTER END USER GUIDE Avaya Learning License Registration Guideline 1 Avaya Learning Center Virtual Campus Registration Guide March 2014 v.2 ENROLLMENT REGISTRATION PROCESS Enrollment is

More information

1- How do you register for an account with Alberta Transportation s Online Services?

1- How do you register for an account with Alberta Transportation s Online Services? 1- How do you register for an account with Alberta Transportation s Online Services? Go to Online Services Home Page at https://www.trans.gov.ab.ca/travisweblogin/redirect.htm and select Register under

More information

Secure Access Manager User Guide September 2017

Secure Access Manager User Guide September 2017 Secure Access Manager User Guide September 2017 1 1 INTRODUCTION... 3 1.1 SUMMARY... 3 2 BASIC FUNCTIONS... 3 2.1 LOGIN TO YOUR SAM ACCOUNT... 3 2.1.1 How to Activate your Account... 3 2.1.2 How to Login

More information

Eligibility & Certification Process ELIGIBILITY CONFIRMING ELIGIBILITY ELIGIBILITY CRITERION 1: BUILDING CHARACTERISTICS

Eligibility & Certification Process ELIGIBILITY CONFIRMING ELIGIBILITY ELIGIBILITY CRITERION 1: BUILDING CHARACTERISTICS ELIGIBILITY To be eligible for Green Star SA Existing Building Performance Rating assessment, buildings must meet each of the following four Eligibility Criteria. 1. Building Characteristics 2. Building

More information

WCCPv2 and WCCP Enhancements

WCCPv2 and WCCP Enhancements WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the

More information

Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1

Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Revision History Version Effective Date Summary of Revisions

More information

e-survey System User Manual for AML/CFT COMPLIANCE REPORT

e-survey System User Manual for AML/CFT COMPLIANCE REPORT BANK NEGARA MALAYSIA CENTRAL BANK OF MALAYSIA e-survey System User Manual for AML/CFT COMPLIANCE REPORT VERSION 1.0 Table of Content BNM e-survey System User Manual for AML/CFT COMPLIANCE REPORT 1. Introduction...

More information

Client Services Procedure Manual

Client Services Procedure Manual Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase

More information

Adding and Editing Chapter and Adviser Information Logging in for the first time (Existing chapters)... 2

Adding and Editing Chapter and Adviser Information Logging in for the first time (Existing chapters)... 2 Chapter Advisers CONTENTS Adding and Editing Chapter and Adviser Information... 2 Logging in for the first time (Existing chapters)... 2 How to edit a chapter s information:... 2 How to view all chapter

More information

Section K: Registration Override Request System

Section K: Registration Override Request System Section K: Registration Override Request System 1. REGISTRATION OVERRIDE SYSTEM... 2 1. 1 INTRODUCTION... 2 2. CARLETON CENTRAL PAGES... 3 2.1 INFORMATION PAGE... 3 2.2 REGISTRATION OVERRIDE REQUEST SUMMARY

More information

Access Control List Network Solution for Cleveland Branch Offices Kevin O Neal DeVry University NETW208: Accessing the WAN

Access Control List Network Solution for Cleveland Branch Offices Kevin O Neal DeVry University NETW208: Accessing the WAN 1 Access Control List Network Solution for Cleveland Branch Offices Kevin O Neal DeVry University NETW208: Accessing the WAN Submitted to: Professor: Hopkins Date: 10.-7-2012 Implementation and Creation

More information

Department of Defense INSTRUCTION. DoD Information Assurance Certification and Accreditation Process (DIACAP)

Department of Defense INSTRUCTION. DoD Information Assurance Certification and Accreditation Process (DIACAP) Department of Defense INSTRUCTION NUMBER 8510.01 November 28, 2007 ASD(NII)/DoD CIO SUBJECT: References: DoD Information Assurance Certification and Accreditation Process (DIACAP) (a) Subchapter III of

More information

NRMCA Sustainable Concrete Plant Certification Policies and Procedures

NRMCA Sustainable Concrete Plant Certification Policies and Procedures NRMCA Sustainable Concrete Plant Certification Policies and Procedures February 2011 1 Introduction 1.1 As interest in sustainable development grows, the ready mixed concrete industry must be able to support

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

BEEDS portal Bank of England Electronic Data Submission portal. User guide. Credit unions Version 1.2

BEEDS portal Bank of England Electronic Data Submission portal. User guide. Credit unions Version 1.2 BEEDS portal Bank of England Electronic Data Submission portal User guide Credit unions Version 1.2 May 2018 Contents Document versions 3 1. Introduction 4 a. Bank of England contact details 4 2. General

More information

Qatar Financial Centre- Regulatory Authority (QFCRA) Electronic Submission System (ESS) User Guide Version 1.2 Dated Feb

Qatar Financial Centre- Regulatory Authority (QFCRA) Electronic Submission System (ESS) User Guide Version 1.2 Dated Feb Qatar Financial Centre- Regulatory Authority (QFCRA) Electronic Submission System (ESS) User Guide Version 1.2 Dated Feb-06-2013 Intellectual Property of QFC-Regulatory Authority Page 1 Table of Contents

More information

IT Security Evaluation and Certification Scheme Document

IT Security Evaluation and Certification Scheme Document IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents

More information

Application for Membership of the Association for Solution Focused Hypnotherapy

Application for Membership of the Association for Solution Focused Hypnotherapy Therapist Reference: (Association use only) Application for Membership of the Association for Solution Focused Hypnotherapy Please complete using block capitals. See attached Guidance Notes for further

More information

Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT Approval Date:

Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT Approval Date: DATA ITEM DESCRIPTION Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT-81845 Approval Date: 20111108 AMSC Number: N9222 Limitation: N/A DTIC Applicable: N/A GIPDEP

More information

ity Information Assurance Vulnerabil DISA ItY Alert Internal Process and SYstem

ity Information Assurance Vulnerabil DISA ItY Alert Internal Process and SYstem IA-00109. Information Assurance Vulnerabil DISA Internal Process and ity I ItY Alert Sy SYstem Jacqueline Price Snouffer jackie.snouffer@ritchie.disa.mil (7 17) 267-9997 9 February 1999 Form SF298 Citation

More information

PORTAL TRANSITION GUIDE. 1 February 2019

PORTAL TRANSITION GUIDE. 1 February 2019 PORTAL TRANSITION GUIDE 1 February 2019 PORTAL TRANSITION GUIDE Portal Transition Guide - 1 February 2019 1 WELCOME The Pharmacy Programs Administrator welcomes you to the new Registration and Claiming

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,

More information

Website Logon Page 2. Candidates Online Assessment Home Page 5. Attempting Online Assessments Page 6. Previous Online Assessment Results Page 10

Website Logon Page 2. Candidates Online Assessment Home Page 5. Attempting Online Assessments Page 6. Previous Online Assessment Results Page 10 IMI Awards Candidate Website Logon Page 2 Candidates Online Assessment Home Page 5 Attempting Online Assessments Page 6 Previous Online Assessment Results Page 10 Centre Personnel Website Logon Page 13

More information

RISP Consultant Registration Guide

RISP Consultant Registration Guide RISP Consultant Registration Guide Prepared By: Document Location: Ministry of Transportation and Infrastructure, Engineering Branch Visit http://www.th.gov.bc.ca/erisp/usermanual.htm for latest version

More information

Administrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements

Administrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements Administrative Changes to TINKERAFBI 33-110, Automated Information System (AIS) Access and Data Release Requirements OPR: 72 ABW/SCP: Special Mission Division References throughout to https://wwwmil.tinker.af.mil/ites/opr.asp

More information

2 Creating New CCQAS 2.8 User Accounts

2 Creating New CCQAS 2.8 User Accounts 2 Creating New CCQAS 2.8 User Accounts The deployment of CCQAS 2.8 which introduced the online privilege application, review, and approval functionality, significantly expanded the number of CCQAS users

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version

More information

Security Professional Education Development (SPēD) DoD Personnel Security Adjudicator Professional Certification (APC) Program Maintenance Procedures

Security Professional Education Development (SPēD) DoD Personnel Security Adjudicator Professional Certification (APC) Program Maintenance Procedures Security Professional Education Development (SPēD) DoD Personnel Security Adjudicator Professional Certification (APC) Program Maintenance Procedures DATE 4 November 2014 SUBJECT: Maintenance and Renewal

More information

St. Christopher (St. Kitts) & Nevis. FATCA Portal User Guide

St. Christopher (St. Kitts) & Nevis. FATCA Portal User Guide St. Christopher (St. Kitts) & Nevis FATCA Portal User Guide Dated issued: February 19, 2016 Contact us: St. Kitts and Nevis Competent Authority 1-869 465 8485 or FATCA@sknird.com TABLE OF CONTENTS Introduction...

More information

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security

More information

Secure Access Manager User Guide December 2017

Secure Access Manager User Guide December 2017 Secure Access Manager User Guide December 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 INTRODUCTION... 3 SUMMARY... 3 BASIC FUNCTIONS... 3 LOGIN TO YOUR SAM ACCOUNT... 3 How to Activate your

More information

Provider Monitoring Report. City and Guilds

Provider Monitoring Report. City and Guilds Provider Monitoring Report City and Guilds 22 May 2017 to 3 August 2017 Contents 1 Background 1 1.1 Scope 1 1.2 Provider Monitoring Report Timeline 2 1.3 Summary of Provider Monitoring Issues and Recommendations

More information

ENVIRONMENTAL LABORATORY APPROVAL PROGRAM CERTIFICATION MANUAL DATE

ENVIRONMENTAL LABORATORY APPROVAL PROGRAM CERTIFICATION MANUAL DATE 1 of 6 List of Topics Covered in this Item: Primary and Secondary Accreditation...1 Personnel...2 Fields of Accreditation...2 Interim Accreditation...3 Notification and Reporting...3 Corrective Actions

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD V2-1

SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD V2-1 2000 Powell Street, Ste. 600 Emeryville, CA 94608 USA +1.510.452.8000 main +1.510.452.8001 fax www.scsglobalservices.com SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD-40-003

More information

Canada Education Savings Program (CESP) Data Interface Operations and Connectivity

Canada Education Savings Program (CESP) Data Interface Operations and Connectivity (CESP) Version Number: 7.0 Version Date: November 24, 2016 Version History Version Release Date Description R 1.0 September 30, 1998 Initial version for HRSDC internal reviews. D 2.0 March 15, 1999 Ongoing

More information

BTEC Centre Guide to Standards Verification

BTEC Centre Guide to Standards Verification BTEC Centre Guide to Standards Verification 2017-2018 Contents Introduction How to use this guide 1. What you need to do 2. What you need to know Standards verification 1. Allocation of your Standards

More information

Please go to to complete the threshold questions. Click Here for the PIMS Users Manual

Please go to   to complete the threshold questions. Click Here for the PIMS Users Manual The 2019 HOME Application will be completely online this year! In order to apply online, all users must register/login to PIMS and submit their Threshold & Self Certification questions. Once approved,

More information

ISFD Release Notices Industrial Security Facilities Database (ISFD) v Metrics Release Notes [Effective February 22, 2014]:

ISFD Release Notices Industrial Security Facilities Database (ISFD) v Metrics Release Notes [Effective February 22, 2014]: ISFD Release Notices Industrial Security Facilities Database (ISFD) v4.0.0.4 Metrics Release Notes [Effective February 22, 2014]: The ISFD system provides a centralized web-based platform for the Industrial

More information

NEW USER GUIDE. 1 February 2019

NEW USER GUIDE. 1 February 2019 NEW USER GUIDE 1 February 2019 NEW USER GUIDE New User Guide / 1 February 2019 i WELCOME Welcome from the Pharmacy Programs Administrator. We administer, process and pay claims associated with the 23 Community

More information

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process... TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Guide to Form 9: Project Completion Form. Submitting a project completion through ENTRUST online

Guide to Form 9: Project Completion Form. Submitting a project completion through ENTRUST online Guide to Form 9: Project Completion Form Submitting a project completion through ENTRUST online February 2015 1. Introduction 1.1 You are required to submit a project completion form for each project which

More information

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1 Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities

More information

BTEC Centre Guide to Standards Verification

BTEC Centre Guide to Standards Verification BTEC Centre Guide to Standards Verification 2016-2017 Contents Introduction How to use this guide 1. What you need to do 2. What you need to know Standards verification 1. Allocation of your Standards

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Hunting The Network Hunting is employed to proactively look for indicators of an active threat or exploitation

More information

Patient Safety Reporting Program. User Guide

Patient Safety Reporting Program. User Guide Patient Safety Reporting Program User Guide for Account Management A how-to guide for healthcare facilities using the Patient Safety Reporting Program account management feature Table of Contents Table

More information

Proposed Interim Model for GDPR Compliance-- Summary Description

Proposed Interim Model for GDPR Compliance-- Summary Description Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models

More information

Port Forwarding Setup (RTA1025W)

Port Forwarding Setup (RTA1025W) Port Forwarding Setup (RTA1025W) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly

More information

Online CDC service. HowTo guide for applicants

Online CDC service. HowTo guide for applicants Online CDC service HowTo guide for applicants Disclaimer While every reasonable effort has been made to ensure that this document is correct at the time of printing, the State of NSW, its agents and employees,

More information

ICSA Labs Network Firewall Certification Testing Report Corporate Criteria Version 4.2. Huawei Technologies. USG Series/Eudemon-N Series

ICSA Labs Network Firewall Certification Testing Report Corporate Criteria Version 4.2. Huawei Technologies. USG Series/Eudemon-N Series ICSA Labs Huawei Technologies USG Series/Eudemon-N Series 4/20/2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com FWXX HUAWEITECH-2015-0420-01 Table of

More information

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013 RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,

More information

DISA Network Services - Data http://www.disa.mil/services/network-services/data/secret-ip 1 of 2 6/28/2012 10:33 AM SERET IP DATA Sign up to receive Secret IP Data email updates SERVIE SUPPORT DISN Global

More information

UNCLASSIFIED // FOUO Pegasus 101 Brief

UNCLASSIFIED // FOUO Pegasus 101 Brief Pegasus 101 Brief Multi-National Information Sharing Program Management Office March 2015 2 Outline Pegasus Defined Pegasus Requirements Pegasus Today Product / Service update Pegasus Improved Service

More information

STUDENT GUIDE Risk Management Framework Step 5: Authorizing Systems

STUDENT GUIDE Risk Management Framework Step 5: Authorizing Systems Slide 1 - Risk Management Framework RMF Module 5 Welcome to Lesson 5 - RMF Step 5 Authorizing Systems. Once the security controls are assessed, the POA&M and security authorization package must be finalized

More information

Information Systems Security Requirements for Federal GIS Initiatives

Information Systems Security Requirements for Federal GIS Initiatives Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the

More information

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3. SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...

More information

ICON Laboratory Services, Inc. isite User Guide

ICON Laboratory Services, Inc. isite User Guide ICON Laboratory Services, Inc. isite User Guide TABLE OF CONTENTS Section 1 Introduction and Creating an Account in isite... 2 Section 2 Log In... 3 2.1 Selecting a Study... 3 Section 3 Viewing Lab Reports...

More information

Interac e-transfer for Business User Guide

Interac e-transfer for Business User Guide Interac e-transfer for Business User Guide User Guide - Interac e-transfer for Business 1 Contents Welcome to ATB Online Business 2 Sending & Receiving with Interac e-transfer 3 Initial Access 3 Not authorized

More information

2 ACCREDITED AUDITORS

2 ACCREDITED AUDITORS 2 ACCREDITED AUDITORS 2.1 Auditor Accreditation 2.1.1 IBAC will issue auditor accreditation and appropriate credentials to individuals that apply for such accreditation and who meet the requirements established

More information

The New IRB Form System Completing IRB Forms the IRB Application (Thesis/Dissertation)

The New IRB Form System Completing IRB Forms the IRB Application (Thesis/Dissertation) The New IRB Form System Completing IRB Forms the IRB Application (Thesis/Dissertation) When you select to complete a new form the form will automatically be created and assigned an identification number.

More information

Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES

Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Category: G950A Server Operating System; Initial Security Requirements CONTENTS: I. Definition

More information

OEL PROVIDER SERVICES PORTAL

OEL PROVIDER SERVICES PORTAL OEL PROVIDER SERVICES PORTAL FREQUENTLY ASKED QUESTIONS February 2018 1. What is the Office of Early Learning (OEL) Provider Services Portal? The OEL Provider Services Portal is a statewide online system

More information

FOR OFFICIAL USE ONLY DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS

FOR OFFICIAL USE ONLY DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS 62225-5222 MEMORANDUM FOR AFNIC/NVI FROM: AFNIC/NW 203 West Losey Street, Room 3100 Scott

More information

How to Complete a MARMS Assessment. User s Guide v.0.1, 2018

How to Complete a MARMS Assessment. User s Guide v.0.1, 2018 How to Complete a MARMS Assessment User s Guide v.0.1, 2018 1 Introduction This User s Guide is intended to provide users with a step by step tutorial on recording an assessment using the MARMS tool Other

More information

Continuing Professional Development Program Guidelines

Continuing Professional Development Program Guidelines Continuing Professional Development Program Guidelines Much of what is learned in obtaining a qualification in today s rapidly changing business environment can quickly become obsolete. Most would agree

More information

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information

More information

Agency Guide for FedRAMP Authorizations

Agency Guide for FedRAMP Authorizations How to Functionally Reuse an Existing Authorization Version 1.0 August 5, 2015 Revision History Date Version Page(s) Description Author 08/05/2015 1.0 All Initial Publication FedRAMP PMO 06/06/2017 1.0

More information

UNSW Apply Online agent homepage

UNSW Apply Online agent homepage UNSW Apply Online agent homepage Counsellor manual Part A: Requesting access STEP 1 Go to applyonline.unsw.edu.au/ agent-login and click Register Now STEP 2 At the following screen, accept Terms & Conditions

More information

UCEM Postgraduate Diploma in Facilities Management

UCEM Postgraduate Diploma in Facilities Management UCEM Postgraduate Diploma in Facilities Management Assessment, progression and award regulations Reference: DipFM regs Version: 04.00 Status: Final Author: G Fogg Date: 06/01/2016 Effective From: February

More information

E X O S T A R, LLC D A T E : M AY V E R S I O N : 4.0

E X O S T A R, LLC D A T E : M AY V E R S I O N : 4.0 SECURE ACCESS MAN AG E R USER GUI DE E X O S T A R, LLC D A T E : M AY 2 0 1 7 V E R S I O N : 4.0 1 S E C U R E AC C E S S M A N A G E R 1 INTRODUCTION... 3 1.1 SUMMARY... 3 2 BASIC FUNCTIONS... 3 2.1

More information

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 10 Aug 15

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 10 Aug 15 DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 10 Aug 15 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of

More information

CMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE

CMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE CMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE TABLE OF CONTENTS RETROACTIVE PROCESSING CONTRACTOR (RPC)

More information

The University of Adelaide. Contractor Online Induction - User Guide

The University of Adelaide. Contractor Online Induction - User Guide The University of Adelaide Contractor Online Induction - User Guide Overview Dear Contractor, The University of Adelaide has recently reviewed its Contractor Induction system. As a result, we have implemented

More information

STEPS FOR CANDIDATE FOR SCHEDULING ITB EXAM

STEPS FOR CANDIDATE FOR SCHEDULING ITB EXAM STEPS FOR CANDIDATE FOR SCHEDULING ITB EXAM 1. Candidates can start registering through the Register for an ITB Certification link on www.pearsonvue.com/itb or directly by clicking on Enrollment link of

More information

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives As companies extend their online

More information

NOTE: This includes Aerospace Auditors (AAs) and Aerospace Experienced Auditors (AEAs)

NOTE: This includes Aerospace Auditors (AAs) and Aerospace Experienced Auditors (AEAs) Purpose: Provide supplemental rules for all stakeholders to facilitate the transition to the 9100/9110/9120:2009 Aerospace Quality Management Systems (AQMS) standards, including use of the updated 9101.

More information

Program Overview. Oregon Government Finance Officers Association Professional Finance Officer Certification Program

Program Overview. Oregon Government Finance Officers Association Professional Finance Officer Certification Program Program Overview Oregon Government Finance Officers Association Professional Finance Officer Certification Program OGFOA Administrative Services 6745 SW Hampton, Suite 101 Portland, OR 97223 Phone: 503-601-2777

More information

Income Tax Department

Income Tax Department Income Tax Department User Guide for Verification of Cash Transactions on AIMS Module (Verification Guide) Version 1.0 (February 21, 2017) Document Version Control Version Date Remarks 1.0 21 st February

More information